9.1
CVE-2025-12480
- EPSS 73.22%
- Veröffentlicht 10.11.2025 14:20:40
- Zuletzt bearbeitet 14.11.2025 02:00:02
- Quelle mandiant-cve@google.com
- CVE-Watchlists
- Unerledigt
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
12.11.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
Gladinet Triofox Improper Access Control Vulnerability
SchwachstelleGladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 73.22% | 0.988 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| mandiant-cve@google.com | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.