CVE-2025-52661
📋 TL;DR
HCL AION version 2 has JWT tokens that remain valid for an excessively long time, allowing attackers who obtain these tokens to potentially maintain unauthorized access to the system. This affects all organizations using HCL AION version 2 with default JWT token expiration settings. The vulnerability increases the window of opportunity for token misuse if tokens are stolen or leaked.
💻 Affected Systems
- HCL AION
📦 What is this software?
Aion by Hcltech
⚠️ Risk & Real-World Impact
Worst Case
An attacker who obtains a valid JWT token could maintain persistent unauthorized access to the AION system for an extended period, potentially accessing sensitive data or performing unauthorized actions.
Likely Case
If JWT tokens are compromised through other means (like credential theft or man-in-the-middle attacks), attackers could maintain access longer than intended, increasing the risk of data exposure or unauthorized system access.
If Mitigated
With proper token management, monitoring, and network segmentation, the impact is limited to temporary access if tokens are compromised, with quick detection and revocation possible.
🎯 Exploit Status
Exploitation requires obtaining a valid JWT token through other means first. The vulnerability itself doesn't provide initial access but extends the usefulness of stolen tokens.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched version
Vendor Advisory: https://support.hcl-software.com/kb_view.do?sys_kb_id=4b92474633de7ad4159a05273e5c7b4b&searchTerm=kb0127995#
Restart Required: Yes
Instructions:
1. Review the HCL advisory for specific patch details. 2. Download the appropriate patch from HCL support. 3. Apply the patch following HCL's installation instructions. 4. Restart the AION service. 5. Verify the fix by checking JWT token expiration settings.
🔧 Temporary Workarounds
Reduce JWT Token Expiration
allManually configure shorter JWT token expiration times to limit the window of opportunity if tokens are compromised
Refer to HCL AION documentation for token configuration settings
Implement Token Revocation
allSet up a token revocation mechanism to invalidate tokens when suspicious activity is detected
Configure token blacklisting or revocation lists in AION
🧯 If You Can't Patch
- Implement network segmentation to isolate AION systems from sensitive resources
- Enhance monitoring of authentication logs for suspicious token usage patterns
🔍 How to Verify
Check if Vulnerable:
Check JWT token expiration settings in AION configuration. If tokens have excessively long expiration times (e.g., days or weeks), the system is vulnerable.
Check Version:
Check AION version through administrative interface or consult system documentation
Verify Fix Applied:
After patching, verify that JWT tokens now have appropriate expiration times (typically hours, not days) and test token functionality.
📡 Detection & Monitoring
Log Indicators:
- Multiple authentication attempts with the same token over extended periods
- Token usage beyond expected expiration windows
Network Indicators:
- Unusual API calls using old authentication tokens
- Traffic patterns suggesting token reuse
SIEM Query:
source="aion_logs" AND (token_age > 86400 OR repeated_auth_attempts > threshold)