CVE-2025-54305

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to bypass authentication in Thermo Fisher Torrent Suite Django application by spoofing localhost IP addresses. Users with local access to the server can authenticate as the ionadmin user without credentials. This affects organizations using the vulnerable version of Torrent Suite software.

💻 Affected Systems

Products:
  • Thermo Fisher Torrent Suite Django application
Versions: 5.18.1
Operating Systems: Any OS running Torrent Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; requires local access to the server hosting the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers gain administrative access to the Torrent Suite application, potentially compromising sensitive genomic data, manipulating analysis results, or disrupting sequencing workflows.

🟠

Likely Case

Malicious insiders or compromised local accounts gain unauthorized administrative access to the application, allowing data access and system manipulation.

🟢

If Mitigated

With proper network segmentation and local access controls, risk is limited to authorized administrators who already have legitimate access.

🌐 Internet-Facing: LOW - Exploitation requires local access to the server; cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Any user with local shell access or ability to send requests from localhost can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial for anyone with local access - simply send HTTP requests with REMOTE_ADDR set to 127.0.0.1, 127.0.1.1, or ::1.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found in provided references

Restart Required: Yes

Instructions:

1. Contact Thermo Fisher support for patch availability. 2. Apply any available security updates. 3. Restart the Torrent Suite service after patching.

🔧 Temporary Workarounds

Remove LocalhostAuthMiddleware

all

Disable or remove the vulnerable middleware from Django settings

# Edit Django settings.py and remove 'LocalhostAuthMiddleware' from MIDDLEWARE list

Network Access Controls

linux

Restrict localhost access to Torrent Suite application

# Configure firewall to block non-essential localhost connections to Torrent Suite port

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local shell access to the Torrent Suite server
  • Monitor authentication logs for unusual localhost authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check if LocalhostAuthMiddleware is enabled in Django settings and test authentication with REMOTE_ADDR set to 127.0.0.1

Check Version:

# Check Torrent Suite version in application interface or configuration files

Verify Fix Applied:

Verify middleware is removed/disabled and test that localhost IPs no longer grant automatic authentication

📡 Detection & Monitoring

Log Indicators:

  • Authentication logs showing ionadmin login from localhost IPs
  • Multiple failed login attempts followed by successful localhost authentication

Network Indicators:

  • HTTP requests to authentication endpoints with localhost source IPs

SIEM Query:

source_ip IN (127.0.0.1, 127.0.1.1, ::1) AND event_type="authentication_success" AND user="ionadmin"

🔗 References

📤 Share & Export