CVE-2025-55373

Incorrect access control in Beakon Application before v5.4.3 allows authenticated attackers with low-level privileges to escalate privileges and execute commands with Administrator rights.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:beakon:beakon:*:*:*:*:*:*:*:*

History

11 Sep 2025, 21:19

Type Values Removed Values Added
References () http://beakon.com - () http://beakon.com - Product
References () https://beakon.com.au - () https://beakon.com.au - Product
References () https://packetstorm.news/files/id/208952/ - () https://packetstorm.news/files/id/208952/ - Broken Link
CPE cpe:2.3:a:beakon:beakon:*:*:*:*:*:*:*:*
First Time Beakon
Beakon beakon

02 Sep 2025, 20:15

Type Values Removed Values Added
CWE CWE-284
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

02 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-02 17:15

Updated : 2025-09-11 21:19


NVD link : CVE-2025-55373

Mitre link : CVE-2025-55373

CVE.ORG link : CVE-2025-55373


JSON object : View

Products Affected

beakon

  • beakon
CWE
CWE-284

Improper Access Control