CVE-2025-62395

4.3 MEDIUM

📋 TL;DR

This vulnerability allows users with lower-level permissions to access cohort information from the system context, potentially exposing restricted administrative data. It affects systems using the vulnerable cohort search web service where improper access controls are in place.

💻 Affected Systems

Products:
  • Red Hat products with cohort search web service functionality
Versions: Specific versions not detailed in provided references
Operating Systems: Linux-based systems running affected Red Hat products
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where cohort search web service is enabled and users have permissions in lower contexts

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could access sensitive administrative cohort data, potentially leading to information disclosure of privileged system information.

🟠

Likely Case

Users with some permissions could access cohort data they shouldn't see, violating intended access controls and potentially exposing some administrative information.

🟢

If Mitigated

With proper access controls and context isolation, the impact would be limited to minimal information disclosure within intended user groups.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user with some permissions attempting to access cohort data from system context

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat advisory for specific fixed versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-62395

Restart Required: No

Instructions:

1. Check Red Hat advisory for affected products. 2. Apply recommended patches. 3. Verify access controls are properly enforced.

🔧 Temporary Workarounds

Restrict cohort search access

all

Temporarily restrict or disable cohort search functionality for non-administrative users

Enforce context isolation

all

Implement additional access control checks to prevent cross-context data access

🧯 If You Can't Patch

  • Implement strict role-based access controls to limit cohort data access
  • Monitor and audit cohort search activities for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if users with lower context permissions can access system context cohort data through the web service

Check Version:

Check product-specific version commands (e.g., rpm -q <package-name>)

Verify Fix Applied:

Test that users can only access cohort data within their assigned context after applying patches

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized cohort search attempts
  • Access to cohort data from unexpected contexts
  • Failed access control checks for cohort queries

Network Indicators:

  • Unusual cohort search request patterns
  • Requests for cohort data from non-administrative users

SIEM Query:

source="cohort_search" AND (user.context!="system" AND data.context="system")

🔗 References

📤 Share & Export