Search criteria

8 vulnerabilities

CVE-2025-25236 (GCVE-0-2025-25236)

Vulnerability from cvelistv5 – Published: 2025-11-12 17:41 – Updated: 2025-11-12 21:04
VLAI?
Summary
Omnissa Workspace ONE UEM contains an observable response discrepancy vulnerability. A malicious actor may be able to enumerate sensitive information such as tenant ID and user accounts that could facilitate brute-force, password-spraying or credential-stuffing attacks.
CWE
  • CWE-204 - Observable Discrepancy Response
Assigner
Impacted products
Vendor Product Version
Omnissa Omnissa Workspace ONE UEM Affected: Omnissa Workspace ONE UEM version prior to 24.10.0.25
Affected: Omnissa Workspace ONE UEM version prior to 24.6.0.44
Affected: Omnissa Workspace ONE UEM version prior to 24.2.0.36
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25236",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-12T20:47:19.871235Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-12T21:04:33.914Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Omnissa Workspace ONE UEM",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version prior to 24.10.0.25"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version prior to 24.6.0.44"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version prior to 24.2.0.36"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Omnissa Workspace ONE UEM contains an observable response discrepancy vulnerability. A malicious actor may be able to enumerate sensitive information such as tenant ID and user accounts that could facilitate brute-force, password-spraying or credential-stuffing attacks.\u003cbr\u003e"
            }
          ],
          "value": "Omnissa Workspace ONE UEM contains an observable response discrepancy vulnerability. A malicious actor may be able to enumerate sensitive information such as tenant ID and user accounts that could facilitate brute-force, password-spraying or credential-stuffing attacks."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-565",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-565 Password Spraying"
            }
          ]
        },
        {
          "capecId": "CAPEC-600",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-600 Credential Stuffing"
            }
          ]
        },
        {
          "capecId": "CAPEC-112",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-112 Brute Force"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-204",
              "description": "CWE-204 Observable Discrepancy Response",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-12T20:37:39.756Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0005.pdf"
        },
        {
          "url": "https://www.omnissa.com/omnissa-security-response/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2025-25236",
    "datePublished": "2025-11-12T17:41:57.042Z",
    "dateReserved": "2025-02-04T20:59:07.334Z",
    "dateUpdated": "2025-11-12T21:04:33.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-25235 (GCVE-0-2025-25235)

Vulnerability from cvelistv5 – Published: 2025-08-11 21:47 – Updated: 2025-08-12 15:45
VLAI?
Summary
Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
Impacted products
Vendor Product Version
Omnissa Secure Email Gateway Unaffected: 2.32 and later (custom)
Unaffected: 2503 and later (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25235",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-12T15:45:19.584760Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-12T15:45:31.666Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Secure Email Gateway",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.32 and later",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "2503 and later",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-08-11T18:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks."
            }
          ],
          "value": "Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-11T21:47:47.823Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://www.omnissa.com/omsa-2025-0003/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Omnissa Secure Email Gateway (SEG) updates address Server-Side Request Forgery (SSRF) vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2025-25235",
    "datePublished": "2025-08-11T21:47:25.510Z",
    "dateReserved": "2025-02-04T20:59:07.334Z",
    "dateUpdated": "2025-08-12T15:45:31.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25229 (GCVE-0-2025-25229)

Vulnerability from cvelistv5 – Published: 2025-08-11 18:24 – Updated: 2025-08-11 18:41
VLAI?
Summary
Omnissa Workspace ONE UEM contains a Server-Side Request Forgery (SSRF) Vulnerability. A malicious actor with user privileges may be able to access restricted internal system information, potentially enabling enumeration of internal network resources.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
Impacted products
Vendor Product Version
Omnissa Omnissa Workspace ONE UEM Affected: Omnissa Workspace ONE UEM version 24.10.0.10 or earlier
Affected: Omnissa Workspace ONE UEM version 24.6.0.34 or earlier
Affected: Omnissa Workspace ONE UEM version 24.2.0.29 or earlier
Affected: Omnissa Workspace ONE UEM version 23.10.0.49 or earlier
Create a notification for this product.
Credits
Omnissa would like to thank Khristopher Tolbert of Maveris for reporting this issue to us.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25229",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-11T18:40:49.393943Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-918",
                "description": "CWE-918 Server-Side Request Forgery (SSRF)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-11T18:41:08.281Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Omnissa Workspace ONE UEM",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 24.10.0.10 or earlier"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 24.6.0.34 or earlier"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 24.2.0.29 or earlier"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 23.10.0.49 or earlier"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Omnissa would like to thank Khristopher Tolbert of Maveris for reporting this issue to us."
        }
      ],
      "datePublic": "2025-08-11T18:23:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Omnissa Workspace ONE UEM contains a Server-Side Request Forgery (SSRF) Vulnerability.\u0026nbsp;A malicious actor with user privileges may be able to access restricted internal system information, potentially enabling enumeration of internal network resources."
            }
          ],
          "value": "Omnissa Workspace ONE UEM contains a Server-Side Request Forgery (SSRF) Vulnerability.\u00a0A malicious actor with user privileges may be able to access restricted internal system information, potentially enabling enumeration of internal network resources."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-11T18:24:17.625Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://www.omnissa.com/omsa-2025-0004/"
        },
        {
          "url": "https://www.omnissa.com/omnissa-security-response/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2025-25229",
    "datePublished": "2025-08-11T18:24:17.625Z",
    "dateReserved": "2025-02-04T20:59:07.333Z",
    "dateUpdated": "2025-08-11T18:41:08.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25231 (GCVE-0-2025-25231)

Vulnerability from cvelistv5 – Published: 2025-08-11 18:12 – Updated: 2025-08-11 18:26
VLAI?
Summary
Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
Omnissa Omnissa Workspace ONE UEM Affected: Omnissa Workspace ONE UEM version 24.10.0.10 or earlier
Affected: Omnissa Workspace ONE UEM version 24.6.0.34 or earlier
Affected: Omnissa Workspace ONE UEM version 24.2.0.29 or earlier
Affected: Omnissa Workspace ONE UEM version 23.10.0.49 or earlier
Create a notification for this product.
Credits
Omnissa would like to thank Assetnote (Adam Kues, Shubham Shah, Dylan Pindur) for reporting this issue to us.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25231",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-11T18:23:47.757115Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-22",
                "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-11T18:26:45.876Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Omnissa Workspace ONE UEM",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 24.10.0.10 or earlier"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 24.6.0.34 or earlier"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 24.2.0.29 or earlier"
            },
            {
              "status": "affected",
              "version": "Omnissa Workspace ONE UEM version 23.10.0.49 or earlier"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Omnissa would like to thank Assetnote (Adam Kues, Shubham Shah, Dylan Pindur) for reporting this issue to us."
        }
      ],
      "datePublic": "2025-08-11T18:08:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability.\u0026nbsp;A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints."
            }
          ],
          "value": "Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability.\u00a0A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-11T18:12:49.711Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0004.pdf"
        },
        {
          "url": "https://www.omnissa.com/omnissa-security-response/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2025-25231",
    "datePublished": "2025-08-11T18:12:49.711Z",
    "dateReserved": "2025-02-04T20:59:07.334Z",
    "dateUpdated": "2025-08-11T18:26:45.876Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25234 (GCVE-0-2025-25234)

Vulnerability from cvelistv5 – Published: 2025-04-17 14:58 – Updated: 2025-04-17 18:53
VLAI?
Summary
Omnissa UAG contains a Cross-Origin Resource Sharing (CORS) bypass vulnerability. A malicious actor with network access to UAG may be able to bypass administrator-configured CORS restrictions to gain access to sensitive networks.
CWE
  • CWE-942 - Permissive Cross-domain Policy with Untrusted Domains
Assigner
Impacted products
Vendor Product Version
Omnissa Omnissa Unified Access Gateway (UAG) Affected: Omnissa Unified Access Gateway 2412 or earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25234",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-17T18:49:19.464733Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-942",
                "description": "CWE-942 Permissive Cross-domain Policy with Untrusted Domains",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T18:53:19.945Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Omnissa Unified Access Gateway (UAG)",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "affected",
              "version": "Omnissa Unified Access Gateway 2412 or earlier"
            }
          ]
        }
      ],
      "datePublic": "2025-04-17T14:58:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Omnissa UAG contains a Cross-Origin Resource Sharing (CORS) bypass vulnerability.\u0026nbsp;A malicious actor with network access to UAG may be able to bypass administrator-configured CORS restrictions to gain access to sensitive networks."
            }
          ],
          "value": "Omnissa UAG contains a Cross-Origin Resource Sharing (CORS) bypass vulnerability.\u00a0A malicious actor with network access to UAG may be able to bypass administrator-configured CORS restrictions to gain access to sensitive networks."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-17T14:58:36.397Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0002.pdf"
        },
        {
          "url": "https://www.omnissa.com/omnissa-security-response/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2025-25234",
    "datePublished": "2025-04-17T14:58:36.397Z",
    "dateReserved": "2025-02-04T20:59:07.334Z",
    "dateUpdated": "2025-04-17T18:53:19.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25230 (GCVE-0-2025-25230)

Vulnerability from cvelistv5 – Published: 2025-04-16 21:29 – Updated: 2025-04-17 13:17
VLAI?
Summary
Omnissa Horizon Client for Windows contains an LPE Vulnerability. A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
Impacted products
Vendor Product Version
Omnissa Omnissa Horizon Client for Windows Affected: Omnissa Horizon Client for Windows 2412 or earlier
Create a notification for this product.
Credits
Omnissa would like to thank Bocheng Xiang (@Crispr) From FDU for reporting this issue to us.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25230",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-17T13:16:42.893422Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T13:17:10.703Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Omnissa Horizon Client for Windows",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "affected",
              "version": "Omnissa Horizon Client for Windows 2412 or earlier"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Omnissa would like to thank Bocheng Xiang (@Crispr) From FDU for reporting this issue to us."
        }
      ],
      "datePublic": "2025-04-16T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Omnissa Horizon Client for Windows contains an LPE Vulnerability.\u0026nbsp;A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges. \u003cbr\u003e"
            }
          ],
          "value": "Omnissa Horizon Client for Windows contains an LPE Vulnerability.\u00a0A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-16T21:29:50.053Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0001.pdf"
        },
        {
          "url": "https://www.omnissa.com/omnissa-security-response/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2025-25230",
    "datePublished": "2025-04-16T21:29:50.053Z",
    "dateReserved": "2025-02-04T20:59:07.333Z",
    "dateUpdated": "2025-04-17T13:17:10.703Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-11468 (GCVE-0-2024-11468)

Vulnerability from cvelistv5 – Published: 2025-02-04 22:17 – Updated: 2025-02-05 15:39
VLAI?
Summary
Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a flaw in the installation process. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.
CWE
  • Installer Process Vulnerability
Assigner
Impacted products
Vendor Product Version
Omnissa Omnissa Horizon Client for MacOS Affected: Omnissa Horizon Client for macOS 2406 or earlier
Create a notification for this product.
Credits
Omnissa would like to thank Max Keasley of WithSecure Consulting for reporting this issue to us.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-11468",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-05T15:38:37.875343Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-276",
                "description": "CWE-276 Incorrect Default Permissions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-05T15:39:33.820Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Omnissa Horizon Client for MacOS",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "affected",
              "version": "Omnissa Horizon Client for macOS 2406 or earlier"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Omnissa would like to thank Max Keasley of WithSecure Consulting for reporting this issue to us."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a flaw in the installation process. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed."
            }
          ],
          "value": "Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a flaw in the installation process. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Installer Process Vulnerability",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-04T22:17:33.319Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://static.omnissa.com/sites/default/files/OMSA-2024-0002.pdf"
        },
        {
          "url": "https://www.omnissa.com/omnissa-security-response/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2024-11468",
    "datePublished": "2025-02-04T22:17:33.319Z",
    "dateReserved": "2024-11-19T21:12:57.595Z",
    "dateUpdated": "2025-02-05T15:39:33.820Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-11467 (GCVE-0-2024-11467)

Vulnerability from cvelistv5 – Published: 2025-02-04 22:12 – Updated: 2025-02-05 15:05
VLAI?
Summary
Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.
CWE
  • Logic Flaw Vulnerability
Assigner
Impacted products
Vendor Product Version
Omnissa Omnissa Horizon Client for MacOS Affected: Omnissa Horizon Client for macOS 2406 or earlier
Create a notification for this product.
Credits
Omnissa would like to thank Paul Montgomery (@nullevent) of TikTok US Data Security, Red Team for reporting this issue to us.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-11467",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-05T15:04:48.828520Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-05T15:05:31.472Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Omnissa Horizon Client for MacOS",
          "vendor": "Omnissa",
          "versions": [
            {
              "status": "affected",
              "version": "Omnissa Horizon Client for macOS 2406 or earlier"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Omnissa would like to thank Paul Montgomery (@nullevent) of TikTok US Data Security, Red Team for reporting this issue to us."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw.\u0026nbsp;Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed.\u003cbr\u003e"
            }
          ],
          "value": "Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a logic flaw.\u00a0Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Logic Flaw Vulnerability",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-04T22:17:27.603Z",
        "orgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
        "shortName": "Omnissa"
      },
      "references": [
        {
          "url": "https://static.omnissa.com/sites/default/files/OMSA-2024-0002.pdf"
        },
        {
          "url": "https://www.omnissa.com/omnissa-security-response/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
    "assignerShortName": "Omnissa",
    "cveId": "CVE-2024-11467",
    "datePublished": "2025-02-04T22:12:39.209Z",
    "dateReserved": "2024-11-19T21:12:41.649Z",
    "dateUpdated": "2025-02-05T15:05:31.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}