CVE-2025-4493

6.5 MEDIUM

📋 TL;DR

This vulnerability allows a PAM (Privileged Access Management) user in Devolutions Server to perform JIT (Just-In-Time) privilege requests on groups they shouldn't have access to. It's caused by an improper privilege assignment issue in the user interface. Organizations running affected versions of Devolutions Server are at risk.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2025.1.3.0 through 2025.1.7.0, and 2024.3.15.0 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PAM functionality with JIT privilege requests. Requires an authenticated PAM user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated PAM user could elevate privileges to access sensitive systems or data they shouldn't have authorization for, potentially leading to lateral movement or data exfiltration.

🟠

Likely Case

A malicious insider or compromised PAM account could gain unauthorized access to additional privileged groups, bypassing intended access controls.

🟢

If Mitigated

With proper network segmentation, monitoring, and least privilege principles, the impact would be limited to the specific PAM environment rather than critical production systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the PAM interface. The vulnerability appears to be a UI logic flaw rather than a technical bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Devolutions Server 2025.1.8.0 and later, 2024.3.16.0 and later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2025-0008/

Restart Required: Yes

Instructions:

1. Download the patched version from Devolutions website. 2. Backup your current installation. 3. Run the installer to upgrade. 4. Restart the Devolutions Server service.

🔧 Temporary Workarounds

Disable PAM JIT functionality

all

Temporarily disable Just-In-Time privilege requests in PAM settings

Restrict PAM user permissions

all

Review and reduce PAM user permissions to minimum required

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the PAM environment
  • Enable detailed auditing of all PAM JIT requests and review logs daily

🔍 How to Verify

Check if Vulnerable:

Check Devolutions Server version in web interface or installation directory. Versions 2025.1.3.0-2025.1.7.0 or ≤2024.3.15.0 are vulnerable.

Check Version:

Check web interface → About, or examine version.txt in installation directory

Verify Fix Applied:

Verify version is 2025.1.8.0+ or 2024.3.16.0+. Test PAM JIT functionality with a test user to ensure proper group restrictions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PAM JIT requests from users
  • JIT requests for groups outside user's normal scope
  • Multiple failed JIT requests followed by success

Network Indicators:

  • Increased PAM API calls from single user
  • Unusual timing of privilege requests

SIEM Query:

source="devolutions-server" AND (event_type="pam_jit_request" AND result="success") | stats count by user, target_group

🔗 References

📤 Share & Export