CVE-2025-11853

6.3 MEDIUM

📋 TL;DR

CVE-2025-11853 is an improper access control vulnerability in Sismics Teedy's API endpoint that allows unauthorized access to files. Attackers can exploit this remotely to access sensitive documents without proper authentication. This affects all Teedy installations up to version 1.11.

💻 Affected Systems

Products:
  • Sismics Teedy
Versions: Up to and including 1.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable if the API endpoint is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all stored documents including sensitive/confidential files, potentially leading to data breach and regulatory violations.

🟠

Likely Case

Unauthorized access to some files, potentially exposing sensitive business documents or personal information.

🟢

If Mitigated

Limited impact with proper network segmentation and additional authentication layers preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly disclosed but no public proof-of-concept code is available. Attack requires understanding of API structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.12 or later

Vendor Advisory: No official vendor advisory available

Restart Required: No

Instructions:

1. Upgrade Teedy to version 1.12 or later. 2. Verify the /api/file endpoint now properly enforces access controls.

🔧 Temporary Workarounds

API Endpoint Restriction

all

Block or restrict access to the vulnerable /api/file endpoint

🧯 If You Can't Patch

  • Implement network-level access controls to restrict API endpoint access to authorized users only
  • Deploy a web application firewall (WAF) with rules to detect and block unauthorized API requests

🔍 How to Verify

Check if Vulnerable:

Check Teedy version via web interface or configuration files. If version is 1.11 or earlier, system is vulnerable.

Check Version:

Check web interface or examine application configuration files for version information

Verify Fix Applied:

After upgrade, attempt to access /api/file endpoint with unauthorized credentials - should receive proper access denied response.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /api/file endpoint
  • Multiple failed authentication attempts followed by successful file access

Network Indicators:

  • Unusual API request patterns to /api/file endpoint
  • File downloads from unauthorized IP addresses

SIEM Query:

source="teedy" AND (uri_path="/api/file" AND response_code=200) AND user="anonymous"

🔗 References

📤 Share & Export