Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers | 
|---|---|
| https://www.canon-europe.com/psirt/advisory-information/ |     | 
Fri, 31 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 31 Oct 2025 10:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a service using the API when connecting to the Therefore™ Server. If the malicious user gains this impersonation user access, then it is possible for them to access the documents stored in Therefore™. This impersonation is at application level (Therefore access level), not the operating system level. | |
| Title | Therefore™ Online and Therefore™ On-Premises contains an account impersonation issue, which could potentially allow the attacker to access all the stored data | |
| Weaknesses | CWE-290 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Canon_EMEA
Published:
Updated: 2025-10-31T18:52:36.823Z
Reserved: 2025-10-16T09:10:03.339Z
Link: CVE-2025-11843
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-31T18:46:57.988Z
 NVD
                        NVD
                    Status : Received
Published: 2025-10-31T10:15:35.800
Modified: 2025-10-31T10:15:35.800
Link: CVE-2025-11843
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.