CVE-2025-2278

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in Devolutions Server to access temporary access and checkout request information by guessing or knowing request IDs. It affects all Devolutions Server deployments running version 2024.3.13 or earlier.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2024.3.13 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the affected version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could enumerate and access all temporary access and checkout requests, potentially exposing sensitive credential information, access patterns, and privileged account details.

🟠

Likely Case

Authenticated users with normal privileges can access request information they shouldn't have permission to view, leading to information disclosure about other users' access patterns and potentially sensitive system information.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to unauthorized viewing of request metadata rather than credential exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of request IDs, which could be guessed or enumerated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.14 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2025-0004/

Restart Required: Yes

Instructions:

1. Download Devolutions Server 2024.3.14 or later from the Devolutions website
2. Backup your current installation and database
3. Run the installer to upgrade
4. Restart the Devolutions Server service

🔧 Temporary Workarounds

Restrict Access to API Endpoints

all

Use network segmentation or firewall rules to restrict access to the vulnerable endpoints to only authorized administrative systems.

Enhanced Monitoring

all

Implement detailed logging and monitoring of access to temporary access and checkout request endpoints to detect suspicious activity.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for authenticated users
  • Consider temporarily disabling temporary access and checkout request features if not critical

🔍 How to Verify

Check if Vulnerable:

Check Devolutions Server version in web interface or via PowerShell: Get-ItemProperty 'HKLM:\SOFTWARE\Devolutions\Server' -Name Version

Check Version:

On Windows: Get-ItemProperty 'HKLM:\SOFTWARE\Devolutions\Server' -Name Version; On Linux: Check /opt/devolutions/server/version.txt

Verify Fix Applied:

Verify version is 2024.3.14 or later and test that authenticated users cannot access request information without proper authorization

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed attempts to access request endpoints with different IDs
  • Unauthorized access patterns to /api/temporaryaccess or /api/checkout endpoints

Network Indicators:

  • Unusual API call patterns to request endpoints from non-administrative users

SIEM Query:

source="devolutions-server" AND (uri_path="/api/temporaryaccess/*" OR uri_path="/api/checkout/*") AND user_role!="admin"

🔗 References

📤 Share & Export