CVE-2025-64064

8.8 HIGH

📋 TL;DR

Primakon Pi Portal 1.0.18 has an insecure direct object reference vulnerability in its /api/v2/pp_users endpoint that allows any authenticated user to escalate privileges to administrator. This affects all organizations using Primakon Pi Portal 1.0.18 with default configurations. Attackers can gain full administrative control over the system.

💻 Affected Systems

Products:
  • Primakon Pi Portal
Versions: 1.0.18
Operating Systems: Any OS running Primakon Pi Portal
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0.18 are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative access, modify all user permissions, access sensitive data, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, data exfiltration, and configuration changes.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place to detect privilege escalation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial with a simple HTTP PATCH request. Public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.19 or later

Vendor Advisory: https://www.primakon.com/rjesenja/primakon-pcm/

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Primakon Pi Portal version 1.0.19 or later from vendor portal. 3. Restart the Pi Portal service. 4. Verify the fix by testing the vulnerability.

🔧 Temporary Workarounds

API Endpoint Restriction

all

Block or restrict access to the vulnerable /api/v2/pp_users endpoint using web application firewall or reverse proxy rules.

# Example nginx location block
location /api/v2/pp_users {
    deny all;
}

Network Segmentation

all

Isolate Primakon Pi Portal from general user networks and restrict access to administrative interfaces only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Pi Portal interface
  • Enable detailed logging and monitoring for privilege escalation attempts and review logs daily

🔍 How to Verify

Check if Vulnerable:

Send authenticated PATCH request to /api/v2/pp_users endpoint with PP_SECURITY_PROFILE_ID=2 in body. If successful, system is vulnerable.

Check Version:

Check Primakon Pi Portal web interface admin panel or configuration files for version information.

Verify Fix Applied:

Attempt the same PATCH request after patching. Should receive permission denied error (403) or similar.

📡 Detection & Monitoring

Log Indicators:

  • HTTP PATCH requests to /api/v2/pp_users endpoint
  • User privilege changes in audit logs
  • Multiple failed authentication attempts followed by successful PATCH

Network Indicators:

  • PATCH requests to /api/v2/pp_users with PP_SECURITY_PROFILE_ID parameter
  • Unusual traffic patterns from low-privilege users

SIEM Query:

source="primakon" AND (url="/api/v2/pp_users" AND method="PATCH")

🔗 References

📤 Share & Export