CVE-2025-64061

4.3 MEDIUM

📋 TL;DR

Primakon Pi Portal 1.0.18's /api/v2/users endpoint lacks proper access controls, allowing any authenticated user to retrieve a complete list of all registered users including their password hashes. This affects all organizations using the vulnerable version of Primakon Pi Portal, exposing sensitive user data to unauthorized internal users.

💻 Affected Systems

Products:
  • Primakon Pi Portal
Versions: 1.0.18
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of version 1.0.18. Any authenticated user, regardless of privilege level, can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain password hashes for all users, potentially enabling credential cracking, lateral movement, and complete system compromise through password reuse or hash cracking attacks.

🟠

Likely Case

Internal users with legitimate low-privilege accounts access sensitive user information including password hashes, potentially leading to credential theft and privilege escalation within the organization.

🟢

If Mitigated

With proper access controls, only authorized administrators can access user lists, preventing unauthorized data exposure and limiting attack surface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires only a valid low-privilege account and a simple GET request to /api/v2/users endpoint. The vulnerability is documented in public repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for patched version

Vendor Advisory: https://www.primakon.com/rjesenja/primakon-pcm/

Restart Required: Yes

Instructions:

1. Check vendor advisory for patched version
2. Download and install the patched version from Primakon
3. Restart the Pi Portal service
4. Verify the fix by testing access controls

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the Pi Portal API endpoint to authorized administrators only

# Example firewall rule (adjust for your environment)
iptables -A INPUT -p tcp --dport [PORT] -s [ADMIN_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP

API Endpoint Disablement

all

Temporarily disable or restrict the vulnerable /api/v2/users endpoint

# Modify web server configuration to block access
# Example for nginx:
location /api/v2/users {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Pi Portal from non-administrative users
  • Deploy a web application firewall (WAF) with rules to block unauthorized access to the /api/v2/users endpoint

🔍 How to Verify

Check if Vulnerable:

Authenticate with a low-privilege account and send GET request to /api/v2/users endpoint. If it returns user data including password hashes, the system is vulnerable.

Check Version:

Check the Pi Portal administration interface or configuration files for version information

Verify Fix Applied:

After patching, attempt the same GET request with a low-privilege account. It should return an access denied error or empty response.

📡 Detection & Monitoring

Log Indicators:

  • Multiple GET requests to /api/v2/users from non-administrative accounts
  • Unusual access patterns to user management endpoints

Network Indicators:

  • GET requests to /api/v2/users from unauthorized IP addresses
  • Large data transfers from the Pi Portal API

SIEM Query:

source="pi-portal-logs" AND uri="/api/v2/users" AND user_role!="admin"

🔗 References

📤 Share & Export