CVE-2025-59596

N/A Unknown

📋 TL;DR

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client that allows attackers on adjacent networks to crash client systems by sending crafted packets when local networking policies are active. This affects users running Secure Access Windows client versions 12.0 through 14.10.

💻 Affected Systems

Products:
  • Absolute Secure Access Windows Client
Versions: 12.0 to 14.10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when local networking policy is active on the client.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring reboot, disrupting user productivity and potentially causing data loss if unsaved work exists.

🟠

Likely Case

Service disruption requiring client restart, causing temporary loss of secure access connectivity.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated clients.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly internet exploitable.
🏢 Internal Only: MEDIUM - Internal attackers on same network segment can cause service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires adjacent network access and knowledge of vulnerable systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.12

Vendor Advisory: https://www.absolute.com/platform/security-information/vulnerability-archive/cve-2025-59596

Restart Required: Yes

Instructions:

1. Download Secure Access Windows client version 14.12 from Absolute portal. 2. Install the update. 3. Restart the system to complete installation.

🔧 Temporary Workarounds

Disable Local Networking Policy

windows

Temporarily disable local networking policy feature to prevent exploitation.

Configure via Absolute management console: Set local networking policy to disabled

Network Segmentation

all

Isolate Secure Access clients from untrusted network segments.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Secure Access clients
  • Monitor for crash events and implement compensating controls

🔍 How to Verify

Check if Vulnerable:

Check Secure Access client version via: Control Panel > Programs > Programs and Features, look for 'Absolute Secure Access' version.

Check Version:

wmic product where name='Absolute Secure Access' get version

Verify Fix Applied:

Verify version shows 14.12 or higher in Control Panel > Programs > Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Secure Access client crashes
  • Event ID 1000 application crashes for Secure Access

Network Indicators:

  • Unusual network traffic to Secure Access client ports from adjacent networks

SIEM Query:

EventID=1000 AND Source='Application Error' AND ProcessName LIKE '%SecureAccess%'

🔗 References

📤 Share & Export