{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-55925","assignerOrgId":"10b61619-3869-496c-8a1e-f291b0e71e3f","state":"PUBLISHED","assignerShortName":"Xerox","dateReserved":"2024-12-13T14:30:30.206Z","datePublished":"2025-01-23T17:03:33.187Z","dateUpdated":"2025-09-17T16:49:42.753Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","platforms":["Windows"],"product":"Xerox Workplace Suite","vendor":"Xerox","versions":[{"lessThan":"5.6.701.9","status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2025-01-23T17:03:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the <code>Host</code> header. If the server improperly validates or trusts the <code>Host</code> header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints."}],"value":"In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints."}],"impacts":[{"capecId":"CAPEC-33","descriptions":[{"lang":"en","value":"CAPEC-33 HTTP Request Smuggling"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-290","description":"CWE-290 Authentication Bypass by Spoofing","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"10b61619-3869-496c-8a1e-f291b0e71e3f","shortName":"Xerox","dateUpdated":"2025-09-17T16:49:42.753Z"},"references":[{"url":"https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"}],"source":{"discovery":"UNKNOWN"},"title":"API Security bypass through header manipulation","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-23T18:56:52.411909Z","id":"CVE-2024-55925","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-23T18:57:13.529Z"}}]}}