CVE-2025-49082 is a vulnerability in the management console
of Absolute Secure Access prior to version 13.56. Attackers with administrative
access to the console and who have been assigned a certain set of permissions
can bypass those permissions to improperly read other settings. The attack
complexity is low, there are no preexisting attack requirements; the privileges
required are high, and there is no user interaction required. The impact to
system confidentiality is low, there is no impact to system availability or
integrity.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-276 | |
Metrics |
ssvc
|
Thu, 31 Jul 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Absolute
Absolute secure Access |
|
Vendors & Products |
Absolute
Absolute secure Access |
Thu, 31 Jul 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CVE-2025-49082 is a vulnerability in the management console of Absolute Secure Access prior to version 13.56. Attackers with administrative access to the console and who have been assigned a certain set of permissions can bypass those permissions to improperly read other settings. The attack complexity is low, there are no preexisting attack requirements; the privileges required are high, and there is no user interaction required. The impact to system confidentiality is low, there is no impact to system availability or integrity. | |
Title | Permissions bypass vulnerability in the Secure Access administrative console of Absolute Secure Access prior to version 13.56 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Absolute
Published: 2025-07-30T23:45:30.677Z
Updated: 2025-07-31T13:30:00.892Z
Reserved: 2025-05-30T18:23:44.238Z
Link: CVE-2025-49082

Updated: 2025-07-31T13:29:54.184Z

Status : Awaiting Analysis
Published: 2025-07-31T00:15:26.783
Modified: 2025-07-31T18:42:37.870
Link: CVE-2025-49082

No data.