CVE-2025-32367

8.6 HIGH

📋 TL;DR

The Oz Forensics face recognition application before version 4.0.8 (late 2023) contains an Insecure Direct Object Reference (IDOR) vulnerability in the /statistic/list endpoint. This allows attackers to retrieve personally identifiable information (PII) without proper authorization. Organizations using vulnerable versions of Oz Forensics face recognition software are affected.

💻 Affected Systems

Products:
  • Oz Forensics Face Recognition Application
Versions: All versions before 4.0.8 (late 2023)
Operating Systems: Not OS-specific - application vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Version 4.0.8 was used for both unpatched and patched versions - careful verification needed. The vulnerability exists in the web application interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exfiltration of sensitive PII data including facial recognition biometrics, personal details, and potentially other confidential information stored in the system.

🟠

Likely Case

Unauthorized access to individual user PII through manipulation of object references in API requests.

🟢

If Mitigated

Limited or no data exposure with proper access controls, authentication, and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but is technically simple once authenticated. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.8 (late 2023 patched version)

Vendor Advisory: https://ozforensics.com/

Restart Required: Yes

Instructions:

1. Verify current version. 2. Contact Oz Forensics for patched version 4.0.8. 3. Backup configuration and data. 4. Apply update following vendor instructions. 5. Restart application services. 6. Verify fix implementation.

🔧 Temporary Workarounds

Access Control Enhancement

all

Implement additional authorization checks at the application layer

Endpoint Restriction

all

Restrict access to /statistic/list endpoint using web application firewall or reverse proxy rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the application from untrusted networks
  • Deploy web application firewall with IDOR protection rules and monitor for suspicious /statistic/list requests

🔍 How to Verify

Check if Vulnerable:

Check application version and test /statistic/list endpoint with unauthorized object references

Check Version:

Check application admin interface or configuration files for version information

Verify Fix Applied:

Test that /statistic/list endpoint properly validates authorization and returns appropriate access denied responses

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts on /statistic/list
  • Unusual access patterns to statistic endpoints
  • Requests with manipulated object IDs

Network Indicators:

  • Unusual traffic to /statistic/list endpoint
  • Pattern of sequential object ID requests

SIEM Query:

source="oz_forensics" AND (uri="/statistic/list" OR uri CONTAINS "statistic") AND (response_code=200 OR response_code=403) | stats count by src_ip, user

🔗 References

📤 Share & Export