ABUP Cloud Update Platform.
Metrics
Affected Vendors & Products
Solution
ABUP did not respond to CISA's request for coordination. The vulnerable method has been removed by the vendor and is no longer accessible. Users of the cloud platform do not need to take any action. Legitimate users of the cloud update platform should be aware that there was a period of exposure that ended on 19 April 2025 and should consider modifying authentication information.
Workaround
No workaround given by the vendor.
Fri, 23 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 22 May 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the ABUP Cloud Update Platform. | |
Title | ABUP IoT Cloud Platform Incorrect Privilege Assignment | |
Weaknesses | CWE-266 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-23T13:32:36.357Z
Reserved: 2025-05-14T18:03:54.555Z
Link: CVE-2025-4692

Updated: 2025-05-23T13:32:18.979Z

Status : Awaiting Analysis
Published: 2025-05-23T00:15:20.020
Modified: 2025-05-23T15:54:42.643
Link: CVE-2025-4692

No data.

No data.