CVE-2025-12766

5.0 MEDIUM

📋 TL;DR

An Insecure Direct Object Reference (IDOR) vulnerability in BlackBerry AtHoc Management Console version 7.21 allows attackers to access information about other organizations hosted on the same Interactive Warning System. This affects organizations using the on-premises version of BlackBerry AtHoc for emergency notifications.

💻 Affected Systems

Products:
  • BlackBerry AtHoc (OnPrem)
Versions: 7.21
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the on-premises version, not cloud deployments. Requires access to the Management Console interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains comprehensive knowledge of other organizations' emergency notification systems, potentially enabling targeted attacks or information gathering about organizational structures.

🟠

Likely Case

Limited information disclosure about other organizations' presence and basic configuration details within the shared IWS platform.

🟢

If Mitigated

No information leakage occurs due to proper access controls and authentication mechanisms preventing unauthorized object references.

🌐 Internet-Facing: MEDIUM - The Management Console is typically internet-facing for remote administration, but exploitation requires authentication.
🏢 Internal Only: LOW - The vulnerability requires access to the Management Console interface, which is typically restricted to authorized administrators.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Management Console. The vulnerability involves manipulating object references to access unauthorized data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.22 or later

Vendor Advisory: https://support.blackberry.com/pkb/s/article/140929

Restart Required: Yes

Instructions:

1. Download the updated version from BlackBerry support portal. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the AtHoc services. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Restrict Management Console Access

all

Limit access to the Management Console to only authorized administrators using network segmentation and strict firewall rules.

Implement Additional Authentication Controls

all

Add multi-factor authentication or IP whitelisting for Management Console access to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Management Console from untrusted networks
  • Enforce principle of least privilege for all Management Console user accounts

🔍 How to Verify

Check if Vulnerable:

Check the AtHoc version in the Management Console under System Information. If version is 7.21, the system is vulnerable.

Check Version:

Not applicable - version check is performed through the Management Console web interface

Verify Fix Applied:

Verify the version shows 7.22 or later in the Management Console System Information page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to organization data objects
  • Failed authorization attempts for cross-organization data access

Network Indicators:

  • Unusual HTTP requests with manipulated object IDs or parameters to Management Console endpoints

SIEM Query:

source="athoc_logs" AND (event_type="data_access" AND org_id!="authorized_org")

🔗 References

📤 Share & Export