CVE-2025-51054

6.5 MEDIUM

📋 TL;DR

Vedo Suite 2024.17 has an authentication bypass vulnerability where unauthenticated attackers can obtain high-privilege JWT tokens by sending empty POST requests to the /autologin/ endpoint. This allows complete system compromise of affected installations. Organizations using Vedo Suite 2024.17 are affected.

💻 Affected Systems

Products:
  • Vedo Suite
Versions: 2024.17
Operating Systems: All platforms running Vedo Suite
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Vedo Suite 2024.17 are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Unauthorized access to sensitive data, privilege escalation, and potential installation of backdoors or malware.

🟢

If Mitigated

Limited impact with proper network segmentation, but still exposes authentication system to abuse.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers to gain administrative access from anywhere.
🏢 Internal Only: HIGH - Even internally, this allows privilege escalation and lateral movement within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub. Attack requires only curl or similar HTTP client.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.18 or later

Vendor Advisory: http://bottinelli.com

Restart Required: No

Instructions:

1. Download latest Vedo Suite version from official vendor site. 2. Backup current installation. 3. Install updated version. 4. Verify /autologin/ endpoint is properly secured.

🔧 Temporary Workarounds

Block /autologin/ endpoint

all

Temporarily block access to vulnerable endpoint using firewall or web server configuration

# Apache: RewriteRule ^/autologin/ - [F]
# Nginx: location /autologin/ { deny all; }
# Firewall: iptables -A INPUT -p tcp --dport 80 -m string --string '/autologin/' --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate Vedo Suite systems from internet and restrict internal network access
  • Implement strict network monitoring for POST requests to /autologin/ endpoint

🔍 How to Verify

Check if Vulnerable:

Send empty POST request to http://[target]/autologin/ and check if valid JWT token is returned without authentication

Check Version:

Check Vedo Suite admin interface or configuration files for version information

Verify Fix Applied:

Attempt same exploit after patch - should receive authentication error or 403/404 response

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /autologin/ endpoint
  • Authentication logs showing admin access from new/unexpected IPs
  • JWT token generation without prior login

Network Indicators:

  • HTTP POST to /autologin/ with empty or minimal payload
  • Subsequent authenticated requests using newly obtained tokens

SIEM Query:

source="web_logs" AND (uri_path="/autologin/" AND http_method="POST")

🔗 References

📤 Share & Export