CVE-2025-46801

9.8 CRITICAL

📋 TL;DR

CVE-2025-46801 is an authentication bypass vulnerability in Pgpool-II that allows attackers to log in as any user without valid credentials. This affects all systems running vulnerable versions of Pgpool-II, potentially exposing database access to unauthorized parties.

💻 Affected Systems

Products:
  • Pgpool-II
Versions: All versions before the security patch (specific version numbers not provided in references)
Operating Systems: All operating systems running Pgpool-II
Default Config Vulnerable: ⚠️ Yes
Notes: All Pgpool-II deployments with authentication enabled are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, tampering, and service disruption through arbitrary user authentication.

🟠

Likely Case

Unauthorized database access leading to data exfiltration or manipulation by attackers who discover the vulnerability.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent external access to Pgpool-II instances.

🌐 Internet-Facing: HIGH - Internet-facing Pgpool-II instances are directly exploitable without authentication.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable but require network access; risk depends on internal security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity once the method is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest Pgpool-II security releases (version not specified in provided references)

Vendor Advisory: https://www.pgpool.net/mediawiki/index.php/Main_Page#News

Restart Required: Yes

Instructions:

1. Check current Pgpool-II version. 2. Download latest security release from pgpool.net. 3. Stop Pgpool-II service. 4. Apply patch or upgrade. 5. Restart Pgpool-II service. 6. Verify authentication works correctly.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Pgpool-II instances to only trusted hosts/networks

# Example using iptables: iptables -A INPUT -p tcp --dport 9999 -s trusted_network -j ACCEPT
# iptables -A INPUT -p tcp --dport 9999 -j DROP

Authentication Layer Enhancement

all

Implement additional authentication layer (like client certificate authentication) if supported

🧯 If You Can't Patch

  • Isolate Pgpool-II instances behind firewalls with strict network access controls
  • Implement network monitoring and intrusion detection for authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check Pgpool-II version and compare against security advisory; test authentication with invalid credentials

Check Version:

pgpool --version

Verify Fix Applied:

Test authentication with invalid credentials after patch; verify they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful connections
  • Multiple user login attempts from same source
  • Unusual user accounts accessing database

Network Indicators:

  • Authentication protocol anomalies
  • Connection attempts to Pgpool-II port (default 9999) from untrusted sources

SIEM Query:

source="pgpool.log" AND ("authentication failed" OR "login successful") | stats count by src_ip, user

🔗 References

📤 Share & Export