Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the
ABUP Cloud Update Platform.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 22 May 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform. | |
Title | ABUP IoT Cloud Platform Incorrect Privilege Assignment | |
Weaknesses | CWE-266 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-05-22T23:12:39.168Z
Updated: 2025-05-23T13:32:36.357Z
Reserved: 2025-05-14T18:03:54.555Z
Link: CVE-2025-4692

Updated: 2025-05-23T13:32:18.979Z

Status : Awaiting Analysis
Published: 2025-05-23T00:15:20.020
Modified: 2025-05-23T15:54:42.643
Link: CVE-2025-4692

No data.