CVE-2025-46390

7.5 HIGH

📋 TL;DR

CVE-2025-46390 is an observable response discrepancy vulnerability (CWE-204) that allows attackers to infer sensitive information by analyzing differences in system responses. This affects systems that leak information through timing differences, error messages, or other observable variations. Organizations using vulnerable software versions are potentially affected.

💻 Affected Systems

Products:
  • Unknown - specific products not identified in provided reference
Versions: Unknown
Operating Systems: All operating systems running vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: CWE-204 vulnerabilities typically affect web applications, APIs, and network services that provide different responses based on internal state.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate valid users, infer internal system state, bypass authentication, or extract sensitive data through side-channel analysis.

🟠

Likely Case

Information disclosure allowing user enumeration, system fingerprinting, or partial data leakage through observable differences in responses.

🟢

If Mitigated

Limited information leakage with proper input validation, uniform error responses, and rate limiting in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-204 vulnerabilities are often easy to exploit with basic tools like curl or custom scripts to analyze response differences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0

Restart Required: No

Instructions:

1. Monitor vendor advisory for patch availability
2. Apply vendor-recommended patches when released
3. Test patches in non-production environment first

🔧 Temporary Workarounds

Implement uniform error responses

all

Ensure all error conditions return identical response timing, format, and content

Add response timing normalization

all

Implement artificial delays to make all response times uniform

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to normalize responses
  • Add rate limiting and monitoring for enumeration attempts

🔍 How to Verify

Check if Vulnerable:

Test with different inputs and analyze response timing, content, and error messages for observable differences

Check Version:

Check software version against vendor advisory when available

Verify Fix Applied:

Verify that all responses (valid and invalid) have identical timing, format, and content

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts with different response times
  • Patterns of sequential user enumeration attempts

Network Indicators:

  • Unusual patterns of similar requests with slight variations
  • High volume of error responses

SIEM Query:

source="web_logs" | where (response_time_variation > threshold) OR (error_patterns indicate enumeration)

🔗 References

📤 Share & Export