CVE-2025-12491

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to retrieve sensitive information from Senstar Symphony installations via the FetchStoredLicense method. The exposed information includes stored credentials that could enable further system compromise. All systems running vulnerable versions of Senstar Symphony are affected.

💻 Affected Systems

Products:
  • Senstar Symphony
Versions: Specific versions not disclosed in available references
Operating Systems: Windows-based systems running Senstar Symphony
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the default installation configuration. Authentication is not required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, gain full control of the security management system, and compromise connected physical security devices.

🟠

Likely Case

Attackers retrieve license information and potentially other sensitive data, enabling reconnaissance for further attacks or credential reuse.

🟢

If Mitigated

Information disclosure limited to non-critical data due to network segmentation and access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-26908 indicates coordinated vulnerability disclosure. The vulnerability requires no authentication and has low technical complexity for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Senstar security advisory for specific patched versions

Vendor Advisory: https://www.senstar.com/security-advisories/

Restart Required: Yes

Instructions:

1. Check current Senstar Symphony version. 2. Download and apply the latest security update from Senstar support portal. 3. Restart the Senstar Symphony service. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Senstar Symphony management interface to trusted IP addresses only

Use firewall rules to limit access to Senstar Symphony ports (typically 80/443 and management ports)

Service Isolation

all

Isolate Senstar Symphony server from internet and untrusted networks

Place server in isolated VLAN or behind additional firewall

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Senstar Symphony from untrusted networks
  • Deploy web application firewall (WAF) with rules to block requests to vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check if unauthenticated requests to FetchStoredLicense endpoint return sensitive information. Monitor for unusual license-related API calls.

Check Version:

Check Senstar Symphony version through web interface or installation directory properties

Verify Fix Applied:

Verify patch version matches vendor recommendation and test that FetchStoredLicense endpoint no longer discloses sensitive information without authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to license-related endpoints
  • Unauthenticated requests to FetchStoredLicense method
  • Multiple failed authentication attempts followed by license API calls

Network Indicators:

  • Unusual traffic to Senstar Symphony management ports from untrusted sources
  • HTTP requests to FetchStoredLicense endpoint without authentication headers

SIEM Query:

source_ip NOT IN trusted_networks AND dest_port IN (80,443,management_ports) AND uri_path CONTAINS 'FetchStoredLicense'

🔗 References

📤 Share & Export