CVE-2025-8312

7.1 HIGH

📋 TL;DR

A deadlock in the PAM automatic check-in feature of Devolutions Server allows passwords to remain valid beyond their intended check-out period. This affects organizations using Devolutions Server for privileged access management, potentially allowing continued access to sensitive systems after credentials should have expired.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2025.2.2.0 through 2025.2.5.0, and 2025.1.12.0 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with PAM automatic check-in feature enabled. The deadlock occurs in the scheduling service component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged credentials remain active indefinitely, allowing unauthorized access to critical systems, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Temporary extension of credential validity beyond policy-defined limits, increasing the window for credential misuse if already compromised.

🟢

If Mitigated

Limited impact with proper monitoring and credential rotation practices, though still violates security policies.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering the deadlock condition in the scheduling service, which may occur under specific timing or load conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2.6.0 and later, 2025.1.13.0 and later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2025-0013/

Restart Required: Yes

Instructions:

1. Download the patched version from Devolutions website. 2. Backup current configuration and database. 3. Run the installer to upgrade. 4. Restart the Devolutions Server service.

🔧 Temporary Workarounds

Disable PAM Automatic Check-in

all

Temporarily disable the affected feature to prevent deadlock conditions

Navigate to PAM settings in Devolutions Server console and disable automatic check-in

Manual Credential Rotation

all

Implement manual credential rotation to ensure passwords expire as intended

Manually check-in/check-out credentials through Devolutions Server interface

🧯 If You Can't Patch

  • Implement strict monitoring of credential usage and expiration alerts
  • Enforce additional authentication factors for privileged access

🔍 How to Verify

Check if Vulnerable:

Check Devolutions Server version in administration console or via 'About' section

Check Version:

Check version in Devolutions Server administration interface or installation directory

Verify Fix Applied:

Verify version is 2025.2.6.0+ or 2025.1.13.0+ and test PAM check-in/check-out functionality

📡 Detection & Monitoring

Log Indicators:

  • Scheduling service deadlock errors
  • PAM check-in failures
  • Credential expiration warnings

Network Indicators:

  • Unusual credential usage patterns
  • Access attempts with expired credentials

SIEM Query:

source="devolutions_server" AND (event_type="deadlock" OR message="check-in failure")

🔗 References

📤 Share & Export