microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability.

This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually.

This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.
Advisories

No advisories yet.

Fixes

Solution

Update to v3.2.2 or higher.


Workaround

No workaround given by the vendor.

History

Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Oct 2025 09:30:00 +0000

Type Values Removed Values Added
Description microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability. This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually. This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.
Title Improper Access Control in CCN-CERT microCLAUDIA
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-10-28T15:35:02.579Z

Reserved: 2025-04-16T09:09:36.724Z

Link: CVE-2025-41090

cve-icon Vulnrichment

Updated: 2025-10-28T13:21:05.880Z

cve-icon NVD

Status : Received

Published: 2025-10-28T10:15:42.573

Modified: 2025-10-28T10:15:42.573

Link: CVE-2025-41090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.