This vulnerability exists in the CAP back office application due to a weak password-reset mechanism implemented at API endpoints. An authenticated remote attacker with a valid login ID could exploit this vulnerability through vulnerable API endpoint which could lead to account takeover of targeted users.
History

Thu, 13 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Mar 2025 11:30:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in the CAP back office application due to a weak password-reset mechanism implemented at API endpoints. An authenticated remote attacker with a valid login ID could exploit this vulnerability through vulnerable API endpoint which could lead to account takeover of targeted users.
Title Account Takeover Vulnerability in CAP back office application
Weaknesses CWE-640
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2025-03-13T19:36:58.038Z

Reserved: 2025-03-13T06:38:16.282Z

Link: CVE-2025-29995

cve-icon Vulnrichment

Updated: 2025-03-13T19:36:53.630Z

cve-icon NVD

Status : Received

Published: 2025-03-13T12:15:13.830

Modified: 2025-03-13T12:15:13.830

Link: CVE-2025-29995

cve-icon Redhat

No data.