CVE-2025-41014

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to determine valid usernames in TCMAN GIM v11 systems by exploiting a user enumeration flaw in the web service endpoint. Attackers can send specially crafted SOAP requests to discover which accounts exist, facilitating further attacks. Organizations using TCMAN GIM v11 version 20250304 are affected.

💻 Affected Systems

Products:
  • TCMAN GIM
Versions: v11 version 20250304
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default web service configuration and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers build a complete list of valid usernames, enabling targeted credential attacks, password spraying, or social engineering campaigns that could lead to full system compromise.

🟠

Likely Case

Attackers enumerate some valid usernames and use them for credential stuffing or targeted phishing attacks against identified users.

🟢

If Mitigated

With proper network segmentation and monitoring, enumeration attempts are detected and blocked before significant user data is collected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a simple SOAP request to the vulnerable endpoint with different usernames and observing response differences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-2

Restart Required: No

Instructions:

1. Monitor vendor website for security updates. 2. Apply patch when available. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Block vulnerable endpoint

linux

Restrict access to /WS/PDAWebService.asmx endpoint at network or application firewall level

# Example iptables rule: iptables -A INPUT -p tcp --dport 80 -m string --string "PDAWebService.asmx" --algo bm -j DROP
# Example iptables rule: iptables -A INPUT -p tcp --dport 443 -m string --string "PDAWebService.asmx" --algo bm -j DROP

Implement rate limiting

all

Configure web server or WAF to limit requests to the vulnerable endpoint

# Apache mod_evasive example: DOSPageCount 2
# Nginx rate limiting: limit_req_zone $binary_remote_addr zone=one:10m rate=1r/s;

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to TCMAN GIM web services to authorized users only
  • Deploy a web application firewall (WAF) with rules to detect and block user enumeration patterns

🔍 How to Verify

Check if Vulnerable:

Send SOAP request to https://[target]/WS/PDAWebService.asmx with soapaction: GetLastDatePasswordChange and pda:username parameter. Compare responses for existing vs non-existing users.

Check Version:

Check TCMAN GIM administration interface or consult system documentation for version information

Verify Fix Applied:

Test that the endpoint no longer returns different responses for valid vs invalid usernames, or that the endpoint is no longer accessible.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts with different usernames
  • Unusual SOAP requests to PDAWebService.asmx endpoint
  • Requests with soapaction: GetLastDatePasswordChange

Network Indicators:

  • High volume of SOAP requests to /WS/PDAWebService.asmx
  • Requests containing 'pda:username' parameter patterns
  • Traffic from unexpected sources to web service endpoints

SIEM Query:

source="web_server" AND (uri="/WS/PDAWebService.asmx" OR soapaction="GetLastDatePasswordChange") | stats count by src_ip

🔗 References

📤 Share & Export