CVE-2025-9986

8.2 HIGH

📋 TL;DR

This vulnerability in Vadi Corporate Information Systems' DIGIKENT software exposes sensitive system information to unauthorized parties. It affects all DIGIKENT versions through September 13, 2025, potentially allowing attackers to gather intelligence about the system for further exploitation.

💻 Affected Systems

Products:
  • Vadi Corporate Information Systems Ltd. Co. DIGIKENT
Versions: through 13092025 (all versions through September 13, 2025)
Operating Systems: Not specified - likely multiple
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all versions up to the specified date; specific configurations may vary risk level.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain critical system information that enables follow-on attacks like privilege escalation, data exfiltration, or complete system compromise.

🟠

Likely Case

Unauthorized access to sensitive configuration data, system details, or internal information that could facilitate targeted attacks.

🟢

If Mitigated

Limited exposure of non-critical information with proper access controls and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-497 typically involves simple information disclosure that doesn't require complex exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-26-0056

Restart Required: No

Instructions:

1. Contact Vadi Corporate Information Systems for patch availability. 2. Monitor vendor communications for updates. 3. Apply patch when available following vendor instructions.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to DIGIKENT systems to authorized networks only

Access Control Hardening

all

Implement strict authentication and authorization controls

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement additional monitoring and alerting for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check DIGIKENT version against affected range (through 13092025)

Check Version:

Check within DIGIKENT application interface or consult vendor documentation

Verify Fix Applied:

Verify installation of vendor-provided patch or updated version

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to sensitive endpoints
  • Unusual data access patterns

Network Indicators:

  • Unexpected requests to system information endpoints
  • Traffic from unauthorized sources

SIEM Query:

source_ip NOT IN authorized_ips AND dest_port IN digikent_ports AND (uri_contains 'system' OR uri_contains 'info' OR uri_contains 'config')

🔗 References

📤 Share & Export