{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-55077","assignerOrgId":"9119a7d8-5eab-497f-8521-727c672e3725","state":"PUBLISHED","assignerShortName":"cisa-cg","dateReserved":"2025-08-06T17:40:21.514Z","datePublished":"2025-08-07T18:37:33.309Z","dateUpdated":"2025-08-12T15:21:13.885Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"Tyler Technologies ERP Pro 9 SaaS allows an authenticated user to escape the application and execute limited operating system commands within the remote Microsoft Windows environment with the privileges of the authenticated user. Tyler Technologies deployed hardened remote Windows environment settings to all ERP Pro 9 SaaS customer environments as of 2025-08-01."}],"affected":[{"vendor":"Tyler Technologies","product":"ERP Pro 9 SaaS","defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"2025-08-01","versionType":"custom"},{"version":"2025-08-01","status":"unaffected"}]}],"problemTypes":[{"descriptions":[{"description":"CWE-250 Execution with Unnecessary Privileges","lang":"en","type":"CWE","cweId":"CWE-250"}]},{"descriptions":[{"description":"CWE-668 Exposure of Resource to Wrong Sphere","lang":"en","type":"CWE","cweId":"CWE-668"}]},{"descriptions":[{"description":"CWE-863 Incorrect Authorization","lang":"en","type":"CWE","cweId":"CWE-863"}]}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L","userInteraction":"NONE","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","subIntegrityImpact":"LOW","vulnIntegrityImpact":"LOW","subAvailabilityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"LOW","vulnConfidentialityImpact":"LOW"}},{"cvssV3_1":{"scope":"CHANGED","version":"3.1","baseScore":7.4,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-08-07T16:46:07.991366Z","id":"CVE-2025-55077","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"Tyler Technologies ERP Pro 9 SaaS application escape","references":[{"name":"url","url":"https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-219-01.json"},{"name":"url","url":"https://www.cve.org/CVERecord?id=CVE-2025-55077"}],"credits":[{"value":"Shawn Plowman, Brookings County","lang":"en"}],"datePublic":"2025-08-07T00:00:00.000Z","providerMetadata":{"orgId":"9119a7d8-5eab-497f-8521-727c672e3725","shortName":"cisa-cg","dateUpdated":"2025-08-07T18:37:33.309Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-12T15:20:55.750343Z","id":"CVE-2025-55077","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-12T15:21:13.885Z"}}]}}