Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the
ABUP Cloud Update Platform.
References
Configurations
No configuration.
History
23 May 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-23 00:15
Updated : 2025-05-23 00:15
NVD link : CVE-2025-4692
Mitre link : CVE-2025-4692
CVE.ORG link : CVE-2025-4692
JSON object : View
Products Affected
No product.
CWE
CWE-266
Incorrect Privilege Assignment