CVE-2025-46745

6.5 MEDIUM

📋 TL;DR

An authenticated user without proper permissions can view other users' account information in affected software. This information disclosure vulnerability affects systems running vulnerable versions of SEL software. The vulnerability requires authenticated access but doesn't need user-management privileges.

💻 Affected Systems

Products:
  • SEL software products (specific products not detailed in reference)
Versions: Versions prior to latest software versions referenced on SEL website
Operating Systems: Not specified in reference
Default Config Vulnerable: ⚠️ Yes
Notes: Based on the CWE-862 (Missing Authorization), this appears to be a missing authorization check in the user information viewing functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could enumerate all user accounts, potentially obtaining sensitive information like usernames, email addresses, or other account details that could facilitate further attacks.

🟠

Likely Case

An authenticated user with limited permissions could view account information of other users, potentially violating privacy policies and exposing organizational structure.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to information disclosure of non-sensitive account details.

🌐 Internet-Facing: MEDIUM - If the affected software is internet-facing, authenticated attackers could exploit this, but authentication requirement reduces immediate risk.
🏢 Internal Only: MEDIUM - Internal users with any level of authentication could potentially view other users' information, creating privacy and security concerns.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but no special permissions. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest software versions available at https://selinc.com/products/software/latest-software-versions/

Vendor Advisory: https://selinc.com/products/software/latest-software-versions/

Restart Required: Yes

Instructions:

1. Visit https://selinc.com/products/software/latest-software-versions/ 2. Identify your specific product 3. Download and install the latest version 4. Restart the application/service

🔧 Temporary Workarounds

Restrict User Access

all

Limit which users can authenticate to the system to reduce potential attackers

Network Segmentation

all

Isolate the affected system from general user networks

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual user information access patterns
  • Consider removing non-essential user accounts and implementing principle of least privilege

🔍 How to Verify

Check if Vulnerable:

Test with a non-privileged authenticated user account to see if user information viewing functionality is accessible

Check Version:

Check software version through product interface or consult SEL documentation for version checking

Verify Fix Applied:

After patching, verify that non-privileged users cannot access other users' account information

📡 Detection & Monitoring

Log Indicators:

  • Multiple user information queries from non-admin accounts
  • Unusual pattern of user data access

Network Indicators:

  • Repeated requests to user information endpoints from non-privileged accounts

SIEM Query:

source="sel_software" AND (event_type="user_info_access" OR endpoint="*/user/*") AND user_role!="admin"

🔗 References

📤 Share & Export