CVE-2025-54305
📋 TL;DR
This vulnerability allows local attackers to bypass authentication in Thermo Fisher Torrent Suite Django application by spoofing localhost IP addresses. Users with local access to the server can authenticate as the ionadmin user without credentials. This affects organizations using the vulnerable version of Torrent Suite software.
💻 Affected Systems
- Thermo Fisher Torrent Suite Django application
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Local attackers gain administrative access to the Torrent Suite application, potentially compromising sensitive genomic data, manipulating analysis results, or disrupting sequencing workflows.
Likely Case
Malicious insiders or compromised local accounts gain unauthorized administrative access to the application, allowing data access and system manipulation.
If Mitigated
With proper network segmentation and local access controls, risk is limited to authorized administrators who already have legitimate access.
🎯 Exploit Status
Exploitation is trivial for anyone with local access - simply send HTTP requests with REMOTE_ADDR set to 127.0.0.1, 127.0.1.1, or ::1.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found in provided references
Restart Required: Yes
Instructions:
1. Contact Thermo Fisher support for patch availability. 2. Apply any available security updates. 3. Restart the Torrent Suite service after patching.
🔧 Temporary Workarounds
Remove LocalhostAuthMiddleware
allDisable or remove the vulnerable middleware from Django settings
# Edit Django settings.py and remove 'LocalhostAuthMiddleware' from MIDDLEWARE list
Network Access Controls
linuxRestrict localhost access to Torrent Suite application
# Configure firewall to block non-essential localhost connections to Torrent Suite port
🧯 If You Can't Patch
- Implement strict access controls to limit who has local shell access to the Torrent Suite server
- Monitor authentication logs for unusual localhost authentication attempts
🔍 How to Verify
Check if Vulnerable:
Check if LocalhostAuthMiddleware is enabled in Django settings and test authentication with REMOTE_ADDR set to 127.0.0.1
Check Version:
# Check Torrent Suite version in application interface or configuration files
Verify Fix Applied:
Verify middleware is removed/disabled and test that localhost IPs no longer grant automatic authentication
📡 Detection & Monitoring
Log Indicators:
- Authentication logs showing ionadmin login from localhost IPs
- Multiple failed login attempts followed by successful localhost authentication
Network Indicators:
- HTTP requests to authentication endpoints with localhost source IPs
SIEM Query:
source_ip IN (127.0.0.1, 127.0.1.1, ::1) AND event_type="authentication_success" AND user="ionadmin"
🔗 References
- https://assets.thermofisher.com/TFS-Assets/LSG/manuals/MAN0026163-Torrent-Suite-5.18-UG.pdf
- https://documents.thermofisher.com/TFS-Assets/CORP/Product-Guides/Ion_OneTouch_2_and_Torrent_Suite_Software.pdf
- https://www.thermofisher.com/us/en/home/life-science/sequencing/next-generation-sequencing/ion-torrent-next-generation-sequencing-workflow/ion-torrent-next-generation-sequencing-data-analysis-workflow/ion-torrent-suite-software.html