CVE-2025-46740

7.5 HIGH

📋 TL;DR

An authenticated user without administrative privileges can change the administrator account name in affected systems. This vulnerability affects systems running specific versions of SEL software where authenticated users have access to account management functions.

💻 Affected Systems

Products:
  • SEL software products with user management functionality
Versions: Specific versions not detailed in reference; consult SEL advisory for exact affected versions
Operating Systems: Not specified; likely cross-platform for SEL software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; exact affected configurations depend on specific SEL product implementations

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could rename the administrator account, potentially locking legitimate administrators out of the system and enabling privilege escalation.

🟠

Likely Case

Malicious insider or compromised user account could disrupt administrative access or create confusion in account management.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to temporary administrative disruption that can be quickly detected and remediated.

🌐 Internet-Facing: MEDIUM - If the affected interface is exposed to the internet, authenticated attackers could exploit this vulnerability.
🏢 Internal Only: HIGH - Internal users with authenticated access pose significant risk as they can exploit this vulnerability without external access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill to change account names through the interface

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest software versions as referenced in SEL advisory

Vendor Advisory: https://selinc.com/products/software/latest-software-versions/

Restart Required: Yes

Instructions:

1. Review SEL advisory for affected products. 2. Download latest software version from SEL. 3. Apply update following SEL documentation. 4. Restart affected systems. 5. Verify administrator account names are correct.

🔧 Temporary Workarounds

Restrict User Management Access

all

Limit account management functions to administrative users only

Enhanced Monitoring

all

Implement logging and alerts for account name changes

🧯 If You Can't Patch

  • Implement strict access controls to limit authenticated users' permissions
  • Enable detailed auditing of all account modification activities

🔍 How to Verify

Check if Vulnerable:

Check if authenticated non-admin users can access account name modification functions in the interface

Check Version:

Check software version through SEL product interface or configuration files

Verify Fix Applied:

Verify that only administrative users can modify administrator account names after update

📡 Detection & Monitoring

Log Indicators:

  • Account name modification events
  • Failed administrator login attempts after account name changes

Network Indicators:

  • Unusual account management requests from non-admin users

SIEM Query:

source="sel_software" AND (event_type="account_modification" OR user_change="administrator")

🔗 References

📤 Share & Export