This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.
History

Thu, 13 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Mar 2025 11:30:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.
Title Authentication Bypass Vulnerability in CAP back office application
Weaknesses CWE-288
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2025-03-13T19:36:11.734Z

Reserved: 2025-03-13T06:38:16.282Z

Link: CVE-2025-29996

cve-icon Vulnrichment

Updated: 2025-03-13T19:36:08.109Z

cve-icon NVD

Status : Received

Published: 2025-03-13T12:15:13.980

Modified: 2025-03-13T12:15:13.980

Link: CVE-2025-29996

cve-icon Redhat

No data.