CVE-2025-67279
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-09

Last updated on: 2026-01-09

Assigner: MITRE

Description
An issue in TIM Solution GmbH TIM BPM Suite & TIM FLOW before v.9.1.2 allows a remote attacker to escalate privileges via the application stores password hashes in MD5 format
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-09
Last Modified
2026-01-09
Generated
2026-05-07
AI Q&A
2026-01-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tim_solution_gmbh tim_bpm_suite *
tim_solution_gmbh tim_flow to 9.1.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability (CVE-2025-67279) affects TIM Solution GmbH's TIM BPM Suite and TIM FLOW software versions before 9.1.2. It involves the use of a broken or risky cryptographic algorithm, specifically the application storing password hashes using the MD5 hashing algorithm, which is considered weak and insecure. This allows a remote attacker to potentially obtain password hashes and escalate privileges. [2]


How can this vulnerability impact me? :

The vulnerability can allow attackers to obtain password hashes protected by weak MD5 hashing, making it easier for them to crack passwords and escalate privileges within the application. This could lead to unauthorized access to user accounts and sensitive data, compromising the security of the system. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying the presence of TIM BPM Suite or TIM FLOW versions prior to 9.1.2 and checking for password hashes stored using the MD5 algorithm. Since the application stores password hashes in MD5 format, you can inspect the database or configuration files for MD5 hashed passwords. Additionally, monitoring HTTP requests for suspicious activity related to privilege escalation attempts may help. Specific commands are not provided in the resources. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading TIM BPM Suite and TIM FLOW to version 9.1.2 or later, as this version addresses the vulnerability. Additionally, follow security best practices such as those recommended by OWASP, including proper password storage (avoiding weak hashing algorithms like MD5), authorization controls, and SQL injection prevention. The vendor has announced remediation efforts, but independent verification is advised. [2, 1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart