CVE-2025-58079

4.3 MEDIUM

📋 TL;DR

This vulnerability in desknet's NEO AppSuite allows attackers to create malicious applications through improper protection of alternate paths. It affects organizations using desknet's NEO versions V4.0R1.0 through V9.0R2.0, potentially enabling unauthorized application deployment.

💻 Affected Systems

Products:
  • desknet's NEO AppSuite
Versions: V4.0R1.0 to V9.0R2.0
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AppSuite application creation privileges to exploit

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could deploy malicious AppSuite applications that steal sensitive data, disrupt operations, or establish persistence within the NEO environment.

🟠

Likely Case

Attackers create applications that exfiltrate user data or perform unauthorized actions within the AppSuite environment.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential application misuse within authorized user contexts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with application creation permissions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the security patch referenced in vendor advisory

Vendor Advisory: https://www.desknets.com/neo/support/mainte/17475/

Restart Required: No

Instructions:

1. Download the security patch from desknet's support site
2. Apply the patch according to vendor instructions
3. Verify patch application through version check

🔧 Temporary Workarounds

Restrict AppSuite Application Creation

all

Limit user permissions for creating AppSuite applications to trusted administrators only

🧯 If You Can't Patch

  • Implement strict access controls for AppSuite application creation
  • Monitor application deployment logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check NEO version against affected range V4.0R1.0 to V9.0R2.0

Check Version:

Check NEO administration console or system information

Verify Fix Applied:

Verify patch application through vendor patch verification tool or version check

📡 Detection & Monitoring

Log Indicators:

  • Unusual AppSuite application creation events
  • Application deployment from unauthorized users

Network Indicators:

  • Unexpected AppSuite application communication patterns

SIEM Query:

source="neo_appsuite" AND (event="application_create" OR event="app_deploy") AND user NOT IN ["admin_users"]

🔗 References

📤 Share & Export