CVE-2025-58443
📋 TL;DR
This CVE describes an authentication bypass vulnerability in FOG Project versions 1.5.10.1673 and below that allows unauthenticated attackers to dump the entire SQL database. All organizations using vulnerable FOG Project installations are affected, potentially exposing sensitive system and user data.
💻 Affected Systems
- FOG Project
📦 What is this software?
Fogproject by Fogproject
⚠️ Risk & Real-World Impact
Worst Case
Complete database exfiltration including sensitive credentials, system configurations, and user data leading to full system compromise and data breach.
Likely Case
Unauthenticated attackers accessing and downloading the entire database, exposing sensitive information and potentially enabling further attacks.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external access to vulnerable systems.
🎯 Exploit Status
The vulnerability allows unauthenticated database dumping, making exploitation straightforward once the attack vector is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Latest version of dev-branch or working-1.6 branch
Vendor Advisory: https://github.com/FOGProject/fogproject/security/advisories/GHSA-mvwm-9m2h-87p9
Restart Required: Yes
Instructions:
1. Backup current FOG installation and database. 2. Upgrade to latest version of either dev-branch or working-1.6 branch. 3. Follow FOG Project documentation: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version. 4. Restart FOG services.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to FOG server to only trusted IP addresses/networks
# Example iptables rule: iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
# Example iptables rule: iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
🧯 If You Can't Patch
- Isolate FOG server from internet and restrict internal network access to only necessary systems
- Implement strict firewall rules and monitor for unusual database access patterns
🔍 How to Verify
Check if Vulnerable:
Check FOG version: cat /opt/fog/.fogsettings | grep version or check web interface version
Check Version:
cat /opt/fog/.fogsettings | grep version
Verify Fix Applied:
Verify version is above 1.5.10.1673 and test authentication requirements for database access endpoints
📡 Detection & Monitoring
Log Indicators:
- Unusual database dump operations
- Unauthenticated access to database endpoints
- Large data transfers from FOG server
Network Indicators:
- Unusual SQL queries from unauthenticated sources
- Large data transfers on database ports
SIEM Query:
source="fog_logs" AND ("database dump" OR "unauthorized access" OR "authentication bypass")