Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform.
History

Fri, 23 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 May 2025 23:30:00 +0000

Type Values Removed Values Added
Description Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform.
Title ABUP IoT Cloud Platform Incorrect Privilege Assignment
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}

cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2025-05-22T23:12:39.168Z

Updated: 2025-05-23T13:32:36.357Z

Reserved: 2025-05-14T18:03:54.555Z

Link: CVE-2025-4692

cve-icon Vulnrichment

Updated: 2025-05-23T13:32:18.979Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-23T00:15:20.020

Modified: 2025-05-23T15:54:42.643

Link: CVE-2025-4692

cve-icon Redhat

No data.