Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.omnissa.com/omsa-2025-0003/ |
|
History
Tue, 12 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Omnissa
Omnissa secure Email Gateway |
|
| Vendors & Products |
Omnissa
Omnissa secure Email Gateway |
Mon, 11 Aug 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks. | |
| Title | Omnissa Secure Email Gateway (SEG) updates address Server-Side Request Forgery (SSRF) vulnerability | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Omnissa
Published: 2025-08-11T21:47:25.510Z
Updated: 2025-08-12T15:45:31.666Z
Reserved: 2025-02-04T20:59:07.334Z
Link: CVE-2025-25235
Updated: 2025-08-12T15:45:26.965Z
Status : Awaiting Analysis
Published: 2025-08-11T22:15:26.693
Modified: 2025-08-12T14:25:33.177
Link: CVE-2025-25235
No data.