CVE-2025-68164

2.7 LOW

📋 TL;DR

This vulnerability in JetBrains TeamCity allows attackers to enumerate open ports on the server when testing Perforce connections. It affects organizations using TeamCity with Perforce integration. The impact is limited to information disclosure about network services.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2025.11
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with Perforce integration configured or accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could map all open ports on the TeamCity server, potentially identifying other vulnerable services for further exploitation.

🟠

Likely Case

Limited information disclosure revealing which ports are open on the TeamCity server, which could aid in reconnaissance for other attacks.

🟢

If Mitigated

Minimal impact as port information alone doesn't grant access, though it could help attackers plan further attacks.

🌐 Internet-Facing: LOW
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires access to TeamCity interface with permissions to test Perforce connections

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.11 or later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup TeamCity configuration and data. 2. Download TeamCity 2025.11 or later from JetBrains website. 3. Stop TeamCity service. 4. Install the new version following JetBrains upgrade guide. 5. Restart TeamCity service.

🔧 Temporary Workarounds

Disable Perforce Integration

all

Remove or disable Perforce VCS roots and connection tests if not required

Restrict Access to VCS Configuration

all

Limit permissions for users who can configure or test VCS connections

🧯 If You Can't Patch

  • Implement network segmentation to isolate TeamCity server from sensitive systems
  • Monitor for unusual port scanning activity from TeamCity server IP addresses

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration → Server Administration → Server Health → Version

Check Version:

Check TeamCity web interface or server logs for version information

Verify Fix Applied:

Confirm version is 2025.11 or later in Administration → Server Administration → Server Health → Version

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed Perforce connection attempts from single source
  • Unusual port scanning patterns from TeamCity server

Network Indicators:

  • Unexpected outbound connections from TeamCity server to multiple ports
  • Port scanning traffic originating from TeamCity server

SIEM Query:

source="teamcity.log" AND ("Perforce test" OR "port scan" OR "connection test")

🔗 References

📤 Share & Export