Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-12480

Summary
Assigner-Mandiant
Assigner Org ID-027e81ed-0dd4-4685-ab4d-884aec5bb484
Published At-10 Nov, 2025 | 14:20
Updated At-12 Nov, 2025 | 17:20
Rejected At-
Credits

Gladinet Triofox Improper Access Control Vulnerability

Gladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–ĽKnown Exploited Vulnerabilities (KEV)
cisa.gov
Vendor:
Gladinet
Product:Triofox
Added At:12 Nov, 2025
Due At:03 Dec, 2025

Gladinet Triofox Improper Access Control Vulnerability

Gladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.

Used in Ransomware

:

Unknown

CWE

:
CWE-284

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Additional Notes:

https://access.triofox.com/releases_history ; https://nvd.nist.gov/vuln/detail/CVE-2025-12480
â–ĽCommon Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Mandiant
Assigner Org ID:027e81ed-0dd4-4685-ab4d-884aec5bb484
Published At:10 Nov, 2025 | 14:20
Updated At:12 Nov, 2025 | 17:20
Rejected At:
â–ĽCVE Numbering Authority (CNA)

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Affected Products
Vendor
TrioFox
Product
TrioFox
Default Status
unaffected
Versions
Affected
  • From 0 before 16.7.10368.56560 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-284CWE-284: Improper Access Control
Type: CWE
CWE ID: CWE-284
Description: CWE-284: Improper Access Control
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-115CAPEC-115 Authentication Bypass
CAPEC ID: CAPEC-115
Description: CAPEC-115 Authentication Bypass
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Stallone D’Souza, Mandiant
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md
third-party-advisory
https://www.triofox.com/
product
https://access.triofox.com/releases_history/
release-notes
https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480
third-party-advisory
Hyperlink: https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md
Resource:
third-party-advisory
Hyperlink: https://www.triofox.com/
Resource:
product
Hyperlink: https://access.triofox.com/releases_history/
Resource:
release-notes
Hyperlink: https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480
Resource:
third-party-advisory
â–ĽAuthorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
kev
dateAdded:
2025-11-12
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2025-12480 added to CISA KEV2025-11-12 00:00:00
Event: CVE-2025-12480 added to CISA KEV
Date: 2025-11-12 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480
government-resource
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480
Resource:
government-resource
Information is not available yet
â–ĽNational Vulnerability Database (NVD)
nvd.nist.gov
Source:mandiant-cve@google.com
Published At:10 Nov, 2025 | 15:15
Updated At:14 Nov, 2025 | 02:00

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2025-11-122025-12-03Gladinet Triofox Improper Access Control VulnerabilityApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Date Added: 2025-11-12
Due Date: 2025-12-03
Vulnerability Name: Gladinet Triofox Improper Access Control Vulnerability
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CPE Matches

gladinet
gladinet
>>triofox>>Versions before 16.7.10368.56560(exclusive)
cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-284Secondarymandiant-cve@google.com
CWE ID: CWE-284
Type: Secondary
Source: mandiant-cve@google.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.triofox.com/releases_history/mandiant-cve@google.com
Release Notes
https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480mandiant-cve@google.com
Exploit
Third Party Advisory
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.mdmandiant-cve@google.com
Third Party Advisory
https://www.triofox.com/mandiant-cve@google.com
Product
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
Hyperlink: https://access.triofox.com/releases_history/
Source: mandiant-cve@google.com
Resource:
Release Notes
Hyperlink: https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480
Source: mandiant-cve@google.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md
Source: mandiant-cve@google.com
Resource:
Third Party Advisory
Hyperlink: https://www.triofox.com/
Source: mandiant-cve@google.com
Resource:
Product
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

55Records found

CVE-2025-1941
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.15% / 36.38%
||
7 Day CHG~0.00%
Published-04 Mar, 2025 | 13:31
Updated-28 Mar, 2025 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxFirefox
CWE ID-CWE-284
Improper Access Control
CVE-2024-27602
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.19% / 41.00%
||
7 Day CHG~0.00%
Published-02 Apr, 2024 | 00:00
Updated-30 Apr, 2025 | 16:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Alldata V0.4.6 is vulnerable to Incorrect Access Control. A total of many modules interface documents have been leaked.For example, the /api/system/v2/api-docs module.

Action-Not Available
Vendor-alldatan/aalldata
Product-alldatan/aalldata
CWE ID-CWE-284
Improper Access Control
CVE-2020-35546
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.11% / 29.53%
||
7 Day CHG~0.00%
Published-19 Feb, 2025 | 00:00
Updated-20 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lexmark MX6500 LW75.JD.P296 and previous devices have Incorrect Access Control via the access control settings.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-284
Improper Access Control
CVE-2020-26942
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.29% / 51.80%
||
7 Day CHG~0.00%
Published-06 Mar, 2024 | 00:00
Updated-05 Mar, 2025 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue discovered in Axigen Mail Server 10.3.x before 10.3.1.27 and 10.3.2.x before 10.3.3.1 allows unauthenticated attackers to submit a setAdminPassword operation request, subsequently setting a new arbitrary password for the admin account.

Action-Not Available
Vendor-axigenn/aaxigen
Product-axigen_mail_servern/aaxigen_mail_server
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-23048
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.1||CRITICAL
EPSS-0.03% / 9.31%
||
7 Day CHG~0.00%
Published-10 Jul, 2025 | 16:56
Updated-22 Jan, 2026 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache HTTP Server: mod_ssl access control bypass with session resumption

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

Action-Not Available
Vendor-The Apache Software Foundation
Product-http_serverApache HTTP Server
CWE ID-CWE-284
Improper Access Control
  • Previous
  • 1
  • 2
  • Next
Details not found