{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-34255","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-04-15T19:15:22.578Z","datePublished":"2025-10-16T18:52:59.964Z","dateUpdated":"2026-05-15T11:15:41.642Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["web interface"],"product":"Nuclias Connect","vendor":"D-Link","versions":[{"lessThan":"1.3.1.4","status":"affected","version":"0","versionType":"custom"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:dlink:nuclias_connect:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.1.4","versionStartIncluding":"0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"Alex Williams from Pellera Technologies"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"D-Link Nuclias Connect firmware versions &lt;= 1.3.1.4 contain an observable response discrepancy vulnerability.&nbsp;The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server.&nbsp;NOTE: D-Link states that a fix is under development.<br>"}],"value":"D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development."}],"impacts":[{"capecId":"CAPEC-575","descriptions":[{"lang":"en","value":"CAPEC-575 Account Footprinting"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-204","description":"CWE-204 Observable Response Discrepancy","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-05-15T11:15:41.642Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/dlink-nuclias-connect-forgot-password-account-enumeration"},{"tags":["product"],"url":"https://www.dlink.com/en/for-business/nuclias/nuclias-connect"},{"tags":["vendor-advisory"],"url":"https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10472"}],"source":{"discovery":"UNKNOWN"},"title":"D-Link Nuclias Connect <= v1.3.1.4 Forgot Password Account Enumeration","x_generator":{"engine":"vulncheck"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-17T14:29:11.316268Z","id":"CVE-2025-34255","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-17T14:29:17.095Z"}}]}}