CVE-2025-52659

2.8 LOW

📋 TL;DR

HCL AION version 2 has a cacheable HTTP response vulnerability where sensitive or dynamic content may be stored in caches. This could allow unauthorized users to access cached information that should be protected. Organizations using HCL AION version 2 are affected.

💻 Affected Systems

Products:
  • HCL AION
Versions: Version 2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of HCL AION version 2 are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive user data, session information, or confidential business data could be exposed to unauthorized parties through cached HTTP responses.

🟠

Likely Case

Limited information disclosure of non-critical cached content, potentially exposing some user-specific data or application details.

🟢

If Mitigated

Minimal impact with proper cache control headers and security configurations in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to cached responses, which may be available through shared caches or browser caches.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://support.hcl-software.com/kb_view.do?sys_kb_id=4b92474633de7ad4159a05273e5c7b4b&searchTerm=kb0127995#

Restart Required: Yes

Instructions:

1. Review the HCL advisory for specific patch details
2. Apply the recommended patch from HCL
3. Restart the AION service
4. Verify cache control headers are properly configured

🔧 Temporary Workarounds

Configure Cache-Control Headers

all

Add appropriate Cache-Control headers to prevent caching of sensitive responses

Configure web server or application to add: Cache-Control: no-store, no-cache, must-revalidate, private

Disable Shared Caching

all

Configure reverse proxies and CDNs to not cache sensitive endpoints

Configure caching rules to exclude sensitive AION endpoints from caching

🧯 If You Can't Patch

  • Implement strict cache control headers for all sensitive endpoints
  • Monitor and audit cache storage for sensitive data exposure

🔍 How to Verify

Check if Vulnerable:

Check if HCL AION version 2 is installed and examine HTTP response headers for missing or weak cache control directives on sensitive endpoints

Check Version:

Check AION administration console or installation documentation for version information

Verify Fix Applied:

Verify that Cache-Control headers are present and properly configured on all sensitive endpoints, and confirm AION version is updated

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests for the same sensitive resource from different users
  • Unusual cache hit patterns on sensitive endpoints

Network Indicators:

  • HTTP responses without proper Cache-Control headers on sensitive endpoints
  • Cached responses containing user-specific data

SIEM Query:

Search for HTTP responses from AION with status 200 and missing Cache-Control headers on sensitive endpoints

🔗 References

📤 Share & Export