CVE-2025-46747

5.7 MEDIUM

📋 TL;DR

An authenticated user without user-management permissions can enumerate other user accounts in affected systems. This information disclosure vulnerability affects systems running vulnerable versions of SEL software where authenticated users have access.

💻 Affected Systems

Products:
  • SEL software products (specific products not detailed in reference)
Versions: Versions prior to latest software versions referenced in advisory
Operating Systems: Not specified in reference
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but not user-management permissions. Exact product list not detailed in provided reference.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map all user accounts, enabling targeted credential attacks, social engineering, or privilege escalation by identifying high-value targets.

🟠

Likely Case

Malicious insiders or compromised accounts could gather intelligence about organizational structure and user accounts for further attacks.

🟢

If Mitigated

Limited to authenticated users only, preventing anonymous enumeration but still allowing insider threats.

🌐 Internet-Facing: MEDIUM - If the system is internet-facing, authenticated attackers could enumerate users remotely.
🏢 Internal Only: MEDIUM - Internal authenticated users can still exploit this for reconnaissance and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but no special permissions. Likely involves API or interface enumeration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest software versions referenced at selinc.com/products/software/latest-software-versions/

Vendor Advisory: https://selinc.com/products/software/latest-software-versions/

Restart Required: Yes

Instructions:

1. Visit SEL advisory URL. 2. Identify affected products. 3. Download latest software versions. 4. Apply updates following vendor documentation. 5. Restart affected services/systems.

🔧 Temporary Workarounds

Restrict user enumeration endpoints

all

Configure access controls to prevent unauthorized users from accessing user enumeration APIs or interfaces

Implement rate limiting

all

Add rate limiting to user-related endpoints to slow down enumeration attempts

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to vulnerable systems
  • Enhance monitoring of user enumeration attempts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Test with authenticated user account (without user-management permissions) to see if user enumeration is possible

Check Version:

Check software version through product interface or vendor documentation

Verify Fix Applied:

After patching, verify authenticated users without user-management permissions cannot enumerate other user accounts

📡 Detection & Monitoring

Log Indicators:

  • Multiple user enumeration requests from single account
  • Access to user listing APIs by non-admin users

Network Indicators:

  • Patterns of repeated requests to user-related endpoints

SIEM Query:

source="sel_software" AND (event_type="user_enumeration" OR endpoint="*/users" OR endpoint="*/accounts") AND user_role!="admin"

🔗 References

📤 Share & Export