CVE-2025-40645

N/A Unknown

📋 TL;DR

This vulnerability allows unauthenticated attackers to retrieve sensitive customer information from Viday systems by making HTTP GET requests to a specific API endpoint. Any Viday installation with the vulnerable endpoint exposed is affected, potentially exposing customer data like phone numbers and associated reservation details.

💻 Affected Systems

Products:
  • Viday
Versions: Specific versions not specified in advisory
Operating Systems: All platforms running Viday
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web API endpoint without requiring authentication

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass extraction of customer PII including phone numbers, names, and reservation details leading to privacy violations, identity theft, and regulatory compliance failures.

🟠

Likely Case

Targeted information gathering about specific customers using phone numbers, enabling social engineering attacks or harassment.

🟢

If Mitigated

Limited exposure with proper authentication and access controls preventing unauthorized API access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request with phone parameter required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-viday

Restart Required: No

Instructions:

1. Monitor vendor for patch release
2. Apply patch when available
3. Test in non-production environment first

🔧 Temporary Workarounds

Block Unauthenticated API Access

all

Implement authentication requirement for /api/reserva/web/clients endpoint

# Web server configuration depends on platform
# Example for nginx: location /api/reserva/web/clients { auth_basic "Restricted"; }

Network Access Control

linux

Restrict access to API endpoint using firewall rules

# Example iptables: iptables -A INPUT -p tcp --dport 80 -m string --string "/api/reserva/web/clients" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to vulnerable endpoint
  • Monitor and alert on suspicious access patterns to the API endpoint

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://[target]/api/reserva/web/clients?phone=[number] and check if customer data is returned without authentication

Check Version:

Check Viday documentation or admin interface for version information

Verify Fix Applied:

Attempt same request after remediation - should receive authentication error or no data

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to GET /api/reserva/web/clients without authentication
  • High volume of requests to API endpoint from single IP

Network Indicators:

  • Unusual traffic patterns to API endpoint
  • Requests with phone parameter from unauthorized sources

SIEM Query:

source="web_server" AND (uri="/api/reserva/web/clients" AND NOT auth_success="true")

🔗 References

📤 Share & Export