CVE-2025-52661

2.4 LOW

📋 TL;DR

HCL AION version 2 has JWT tokens that remain valid for an excessively long time, allowing attackers who obtain these tokens to potentially maintain unauthorized access to the system. This affects all organizations using HCL AION version 2 with default JWT token expiration settings. The vulnerability increases the window of opportunity for token misuse if tokens are stolen or leaked.

💻 Affected Systems

Products:
  • HCL AION
Versions: Version 2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default JWT token expiration configuration. Systems using custom token expiration settings may not be affected if properly configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker who obtains a valid JWT token could maintain persistent unauthorized access to the AION system for an extended period, potentially accessing sensitive data or performing unauthorized actions.

🟠

Likely Case

If JWT tokens are compromised through other means (like credential theft or man-in-the-middle attacks), attackers could maintain access longer than intended, increasing the risk of data exposure or unauthorized system access.

🟢

If Mitigated

With proper token management, monitoring, and network segmentation, the impact is limited to temporary access if tokens are compromised, with quick detection and revocation possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining a valid JWT token through other means first. The vulnerability itself doesn't provide initial access but extends the usefulness of stolen tokens.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://support.hcl-software.com/kb_view.do?sys_kb_id=4b92474633de7ad4159a05273e5c7b4b&searchTerm=kb0127995#

Restart Required: Yes

Instructions:

1. Review the HCL advisory for specific patch details. 2. Download the appropriate patch from HCL support. 3. Apply the patch following HCL's installation instructions. 4. Restart the AION service. 5. Verify the fix by checking JWT token expiration settings.

🔧 Temporary Workarounds

Reduce JWT Token Expiration

all

Manually configure shorter JWT token expiration times to limit the window of opportunity if tokens are compromised

Refer to HCL AION documentation for token configuration settings

Implement Token Revocation

all

Set up a token revocation mechanism to invalidate tokens when suspicious activity is detected

Configure token blacklisting or revocation lists in AION

🧯 If You Can't Patch

  • Implement network segmentation to isolate AION systems from sensitive resources
  • Enhance monitoring of authentication logs for suspicious token usage patterns

🔍 How to Verify

Check if Vulnerable:

Check JWT token expiration settings in AION configuration. If tokens have excessively long expiration times (e.g., days or weeks), the system is vulnerable.

Check Version:

Check AION version through administrative interface or consult system documentation

Verify Fix Applied:

After patching, verify that JWT tokens now have appropriate expiration times (typically hours, not days) and test token functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication attempts with the same token over extended periods
  • Token usage beyond expected expiration windows

Network Indicators:

  • Unusual API calls using old authentication tokens
  • Traffic patterns suggesting token reuse

SIEM Query:

source="aion_logs" AND (token_age > 86400 OR repeated_auth_attempts > threshold)

🔗 References

📤 Share & Export