Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the
ABUP Cloud Update Platform.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 May 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform. | |
| Title | ABUP IoT Cloud Platform Incorrect Privilege Assignment | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2025-05-22T23:12:39.168Z
Updated: 2025-05-23T13:32:36.357Z
Reserved: 2025-05-14T18:03:54.555Z
Link: CVE-2025-4692
Updated: 2025-05-23T13:32:18.979Z
Status : Awaiting Analysis
Published: 2025-05-23T00:15:20.020
Modified: 2025-05-23T15:54:42.643
Link: CVE-2025-4692
No data.