Vulnerabilites related to Securden - Unified PAM
CVE-2025-53119 (GCVE-0-2025-53119)
Vulnerability from cvelistv5
Published
2025-08-25 16:09
Modified
2025-08-25 20:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
An unauthenticated unrestricted file upload vulnerability allows an attacker to upload malicious binaries and scripts to the server.
References
▼ | URL | Tags |
---|---|---|
https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/ | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Securden | Unified PAM |
Version: 9.0.* ≤ 11.3.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53119", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-25T20:32:48.094480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-25T20:32:56.975Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Unified PAM", "vendor": "Securden", "versions": [ { "lessThanOrEqual": "11.3.1", "status": "affected", "version": "9.0.*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Aaron Herndon, Principal Security Consultant, and Marcus Chang, Security Consultant, both of Rapid7." } ], "datePublic": "2025-08-25T16:07:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An unauthenticated unrestricted file upload vulnerability allows an attacker to upload malicious binaries and scripts to the server." } ], "value": "An unauthenticated unrestricted file upload vulnerability allows an attacker to upload malicious binaries and scripts to the server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-25T16:09:19.528Z", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Securden Unified PAM Unauthenticated Unrestricted File Upload", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2025-53119", "datePublished": "2025-08-25T16:09:19.528Z", "dateReserved": "2025-06-26T09:06:04.496Z", "dateUpdated": "2025-08-25T20:32:56.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6737 (GCVE-0-2025-6737)
Vulnerability from cvelistv5
Published
2025-08-25 16:17
Modified
2025-08-25 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1391 - Use of Weak Credentials
Summary
Securden’s Unified PAM Remote Vendor Gateway access portal shares infrastructure and access tokens across multiple tenants. A malicious actor can obtain authentication material and access the gateway server with low-privilege permissions.
References
▼ | URL | Tags |
---|---|---|
https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/ | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Securden | Unified PAM |
Version: 9.0.* ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6737", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-25T20:33:21.628081Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-25T20:33:31.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Unified PAM", "vendor": "Securden", "versions": [ { "lessThan": "11.3.1", "status": "affected", "version": "9.0.*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Aaron Herndon, Principal Security Consultant, and Marcus Chang, Security Consultant, both of Rapid7." } ], "datePublic": "2025-08-25T16:12:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Securden\u2019s Unified PAM Remote Vendor Gateway access portal shares infrastructure and access tokens across multiple tenants. A malicious actor can obtain authentication material and access the gateway server with low-privilege permissions." } ], "value": "Securden\u2019s Unified PAM Remote Vendor Gateway access portal shares infrastructure and access tokens across multiple tenants. A malicious actor can obtain authentication material and access the gateway server with low-privilege permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1391", "description": "CWE-1391: Use of Weak Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-25T16:17:42.677Z", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Securden Unified PAM Shared SSH Key and Cloud Infrastructure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2025-6737", "datePublished": "2025-08-25T16:17:42.677Z", "dateReserved": "2025-06-26T16:04:22.365Z", "dateUpdated": "2025-08-25T20:33:31.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53120 (GCVE-0-2025-53120)
Vulnerability from cvelistv5
Published
2025-08-25 16:11
Modified
2025-08-25 19:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
A path traversal vulnerability in unauthenticated upload functionality allows a malicious actor to upload binaries and scripts to the server’s configuration and web root directories, achieving remote code execution on the Unified PAM server.
References
▼ | URL | Tags |
---|---|---|
https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/ | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Securden | Unified PAM |
Version: 9.0.* ≤ 11.3.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53120", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-25T19:01:29.789142Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-25T19:01:33.022Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Unified PAM", "vendor": "Securden", "versions": [ { "lessThanOrEqual": "11.3.1", "status": "affected", "version": "9.0.*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Aaron Herndon, Principal Security Consultant, and Marcus Chang, Security Consultant, both of Rapid7." } ], "datePublic": "2025-08-25T16:09:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A path traversal vulnerability in unauthenticated upload functionality allows a malicious actor to upload binaries and scripts to the server\u2019s configuration and web root directories, achieving remote code execution on the Unified PAM server." } ], "value": "A path traversal vulnerability in unauthenticated upload functionality allows a malicious actor to upload binaries and scripts to the server\u2019s configuration and web root directories, achieving remote code execution on the Unified PAM server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-25T16:11:38.645Z", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Securden Unified PAM Path Traversal In File Upload", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2025-53120", "datePublished": "2025-08-25T16:11:38.645Z", "dateReserved": "2025-06-26T09:06:04.496Z", "dateUpdated": "2025-08-25T19:01:33.022Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53118 (GCVE-0-2025-53118)
Vulnerability from cvelistv5
Published
2025-08-25 16:06
Modified
2025-08-25 20:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session tokens stored by the Unified PAM.
References
▼ | URL | Tags |
---|---|---|
https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/ | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Securden | Unified PAM |
Version: 9.0.* ≤ 11.3.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53118", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-25T20:32:23.421424Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-25T20:32:32.947Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Unified PAM", "vendor": "Securden", "versions": [ { "lessThanOrEqual": "11.3.1", "status": "affected", "version": "9.0.*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Aaron Herndon, Principal Security Consultant, and Marcus Chang, Security Consultant, both of Rapid7." } ], "datePublic": "2025-08-25T16:03:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session tokens stored by the Unified PAM." } ], "value": "An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session tokens stored by the Unified PAM." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-25T16:06:46.437Z", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Securden Unified PAM Authentication Bypass", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2025-53118", "datePublished": "2025-08-25T16:06:03.962Z", "dateReserved": "2025-06-26T09:06:04.496Z", "dateUpdated": "2025-08-25T20:32:32.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }