{"vulnerability": "CVE-2025-6081", "sightings": [{"uuid": "6274bd8e-a7be-4725-b513-a41f699f87ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6081", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/20003", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6081\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Insufficiently Protected Credentials in LDAP in Konica Minolta\u00a0bizhub 227 Multifunction printers\u00a0version GCQ-Y3 or earlier\u00a0allows an attacker can reconfigure the target device to use an external LDAP service controlled by the attacker. If an LDAP password is set on the target device, the attacker can force the target device to authenticate to the attacker controlled LDAP service. This will allow the attacker to capture the plaintext password of the configured LDAP service.\n\ud83d\udccf Published: 2025-07-01T03:25:38.240Z\n\ud83d\udccf Modified: 2025-07-01T03:25:38.240Z\n\ud83d\udd17 References:\n1. https://www.rapid7.com/blog/post/cve-2025-6081-konica-minolta-bizhub-pass-back-attack-vulnerability-not-fixed/\n2. https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0003.pdf", "creation_timestamp": "2025-07-01T04:09:20.000000Z"}]}