CVE-2025-64066
📋 TL;DR
Primakon Pi Portal 1.0.18 has a broken access control vulnerability in its user registration endpoint that allows unauthenticated attackers to create new user accounts in the local database. This bypasses the intended security model which relies on external identity providers for registration. All organizations using the vulnerable version are affected.
💻 Affected Systems
- Primakon Pi Portal
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers create administrative accounts, chain with other vulnerabilities for privilege escalation, and achieve complete compromise of the application and underlying systems.
Likely Case
Attackers create unauthorized user accounts, enumerate existing users for reconnaissance, and potentially gain initial access for further attacks.
If Mitigated
Proper authorization controls prevent unauthorized registration, limiting impact to reconnaissance via user enumeration attempts.
🎯 Exploit Status
Simple HTTP POST request to /api/v2/user/register endpoint with user data. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.primakon.com/rjesenja/primakon-pcm/
Restart Required: No
Instructions:
1. Monitor vendor advisory for patch release. 2. Apply patch when available. 3. Test in non-production environment first.
🔧 Temporary Workarounds
Web Application Firewall Rule
allBlock or restrict access to /api/v2/user/register endpoint
WAF-specific configuration required
Network Access Control
linuxRestrict network access to the vulnerable endpoint using firewall rules
iptables -A INPUT -p tcp --dport [PORT] -m string --string "/api/v2/user/register" --algo bm -j DROP
🧯 If You Can't Patch
- Implement strong network segmentation to isolate the vulnerable system
- Deploy intrusion detection systems to monitor for registration attempts
🔍 How to Verify
Check if Vulnerable:
Send POST request to https://[target]/api/v2/user/register with user data and check if account is created without authentication
Check Version:
Check application version in web interface or configuration files
Verify Fix Applied:
Attempt same POST request after remediation - should receive 401/403 error or redirect to authentication
📡 Detection & Monitoring
Log Indicators:
- POST requests to /api/v2/user/register from unauthenticated sources
- Unusual user account creation events
Network Indicators:
- HTTP POST to registration endpoint without authentication headers
- Multiple registration attempts from single IP
SIEM Query:
source="web_logs" AND uri_path="/api/v2/user/register" AND http_method="POST" AND NOT auth_token=*