CVE-2025-12808

6.5 MEDIUM

📋 TL;DR

An improper access control vulnerability in Devolutions Server allows users with 'View-only' permissions to access sensitive nested password fields they shouldn't have access to, potentially exposing password lists and custom values. This affects Devolutions Server versions 2025.3.2.0 through 2025.3.5.0 and 2025.2.15.0 and earlier. Attackers with view-only access can escalate privileges to read sensitive password data.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2025.3.2.0 through 2025.3.5.0, and 2025.2.15.0 and earlier
Operating Systems: All platforms running Devolutions Server
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with view-only users are vulnerable. The vulnerability specifically affects access to third-level nested fields containing sensitive data.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all stored passwords and sensitive credentials managed by Devolutions Server, leading to lateral movement across the entire infrastructure.

🟠

Likely Case

Unauthorized disclosure of password lists and custom values to users who should only have read-only access, potentially exposing credentials for critical systems.

🟢

If Mitigated

Limited exposure of some sensitive fields, but overall credential management system remains secure with proper access controls.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires authenticated access, internet-facing instances could be targeted by attackers who obtain view-only credentials.
🏢 Internal Only: HIGH - Internal users with view-only access could exploit this to gain unauthorized access to sensitive credentials, enabling privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires only view-only user credentials and knowledge of how to access nested fields.

Exploitation requires authenticated access with view-only permissions. Attackers would need to understand the Devolutions interface to navigate to sensitive nested fields.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Devolutions Server 2025.3.5.1 or later, or upgrade to a version beyond the affected ranges

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2025-0016

Restart Required: Yes

Instructions:

1. Backup your Devolutions Server configuration and data. 2. Download the patched version from Devolutions official website. 3. Run the installer to upgrade to version 2025.3.5.1 or later. 4. Restart the Devolutions Server service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict View-Only User Access

all

Temporarily remove or restrict view-only user permissions until patching can be completed.

Navigate to Devolutions Server Admin Console > Users > Edit User Permissions > Remove view-only access to sensitive entries

Audit and Monitor View-Only User Activity

all

Implement enhanced logging and monitoring for view-only user access to sensitive password fields.

Enable detailed audit logging in Devolutions Server settings
Configure alerts for unusual access patterns to password lists

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Devolutions Server from critical systems
  • Conduct immediate user access review and remove unnecessary view-only permissions

🔍 How to Verify

Check if Vulnerable:

Check Devolutions Server version in Admin Console > About, or run: Get-ItemProperty -Path 'HKLM:\SOFTWARE\Devolutions\Devolutions Server' -Name Version

Check Version:

Get-ItemProperty -Path 'HKLM:\SOFTWARE\Devolutions\Devolutions Server' -Name Version (Windows) or check /opt/devolutions/devolutions-server/version.txt (Linux)

Verify Fix Applied:

Verify version is 2025.3.5.1 or later, and test that view-only users cannot access password list custom values in nested fields.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns by view-only users to password-related endpoints
  • Multiple failed attempts followed by successful access to nested password fields

Network Indicators:

  • Increased API calls to password retrieval endpoints from view-only user accounts

SIEM Query:

source="devolutions-server" AND (event_type="password_access" OR endpoint="*/password*") AND user_role="view-only"

🔗 References

📤 Share & Export