CVE-2025-64180

10.0 CRITICAL

📋 TL;DR

A critical TOCTOU vulnerability in Manager accounting software allows attackers to bypass DNS validation and access internal network resources. Both Desktop (no authentication required) and Server (standard authentication required) editions are affected. This enables unauthorized access to internal services, cloud metadata endpoints, and protected network segments.

💻 Affected Systems

Products:
  • Manager Desktop
  • Manager Server
Versions: 25.11.1.3085 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Desktop edition requires no authentication; Server edition requires standard authentication. Both are vulnerable in default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise allowing attackers to access sensitive internal systems, cloud metadata, and protected segments, potentially leading to data exfiltration, lateral movement, and full network takeover.

🟠

Likely Case

Unauthorized access to internal services and cloud metadata, enabling reconnaissance, data theft, and potential privilege escalation within the network.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent lateral movement, though initial breach of network isolation still occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of TOCTOU conditions and DNS manipulation, but no authentication needed for Desktop edition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.11.1.3086

Vendor Advisory: https://github.com/Manager-io/Manager/security/advisories/GHSA-j2xj-xhph-p74j

Restart Required: Yes

Instructions:

1. Download version 25.11.1.3086 from official Manager sources. 2. Stop Manager service. 3. Install the update. 4. Restart Manager service. 5. Verify version is 25.11.1.3086 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Manager instances from sensitive internal networks and cloud metadata endpoints using firewall rules.

DNS Restriction

all

Configure DNS to restrict Manager's ability to resolve internal domain names and metadata endpoints.

🧯 If You Can't Patch

  • Isolate affected systems in a dedicated network segment with strict egress filtering
  • Implement application-level firewalls to block access to internal resources and metadata endpoints

🔍 How to Verify

Check if Vulnerable:

Check Manager version in application settings or via 'manager --version' command. If version is 25.11.1.3085 or lower, system is vulnerable.

Check Version:

manager --version

Verify Fix Applied:

Confirm version is 25.11.1.3086 or higher using the same version check method.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DNS queries from Manager process
  • Access attempts to internal services from Manager host
  • Connection attempts to cloud metadata endpoints

Network Indicators:

  • Unexpected outbound connections from Manager hosts to internal network segments
  • DNS queries for internal domains from Manager instances

SIEM Query:

source="manager" AND (dest_ip IN internal_ranges OR dns_query="metadata.*")

🔗 References

📤 Share & Export