CVE-2025-54345

7.5 HIGH

📋 TL;DR

This vulnerability in Desktop Alert PingAlert exposes sensitive information to unauthorized actors. It affects users running Application Server versions 6.1.0.11 through 6.1.1.2, potentially allowing attackers to access confidential data without authentication.

💻 Affected Systems

Products:
  • Desktop Alert PingAlert Application Server
Versions: 6.1.0.11 to 6.1.1.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Application Server component of PingAlert. Client installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive organizational data including credentials, configuration details, and potentially user information leading to further attacks.

🟠

Likely Case

Unauthorized access to configuration files, system information, or other sensitive data that could facilitate reconnaissance for additional attacks.

🟢

If Mitigated

Limited exposure of non-critical information with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-200 indicates information exposure vulnerability, typically requiring minimal technical skill to exploit once the exposure vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.1.1.3 or later

Vendor Advisory: https://desktopalert.net/cve-2025-54345/

Restart Required: Yes

Instructions:

1. Download latest version from vendor website. 2. Backup current configuration. 3. Run installer to upgrade. 4. Restart Application Server service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Application Server to authorized networks only

Configure firewall rules to limit inbound connections to Application Server port

Access Control Lists

windows

Implement IP-based restrictions on the Application Server

Configure Application Server to only accept connections from trusted IP ranges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Application Server
  • Deploy web application firewall with rules to detect and block information disclosure attempts

🔍 How to Verify

Check if Vulnerable:

Check Application Server version in About dialog or configuration files. Versions 6.1.0.11 through 6.1.1.2 are vulnerable.

Check Version:

Check PingAlert Application Server About menu or examine version.txt in installation directory

Verify Fix Applied:

Confirm version is 6.1.1.3 or later and test that sensitive endpoints no longer expose information to unauthorized requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Application Server endpoints
  • Multiple failed authentication attempts followed by successful information requests

Network Indicators:

  • Unusual traffic to Application Server from unauthorized IP addresses
  • Patterns of information gathering requests

SIEM Query:

source="pingalert.log" AND (event="unauthorized_access" OR event="sensitive_data_request")

🔗 References

📤 Share & Export