{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6942","assignerOrgId":"1443cd92-d354-46d2-9290-d812316ca43a","state":"PUBLISHED","assignerShortName":"Delinea","dateReserved":"2025-06-30T22:28:26.930Z","datePublished":"2025-07-02T15:49:16.894Z","dateUpdated":"2025-07-02T19:46:25.837Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","modules":["Distributed Engine"],"product":"Secret Server","vendor":"Delinea","versions":[{"lessThanOrEqual":"11.7.49","status":"affected","version":"0","versionType":"Secret Server"},{"lessThanOrEqual":"8.4.39.0","status":"affected","version":"0","versionType":"Distributed Engine"}]}],"credits":[{"lang":"en","type":"finder","value":"NCIA researchers"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The distributed engine versions 8.4.39.0 and earlier of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine."}],"value":"The distributed engine versions 8.4.39.0 and earlier of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine."}],"impacts":[{"capecId":"CAPEC-22","descriptions":[{"lang":"en","value":"CAPEC-22 Exploiting Trust in Client"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":3.8,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-639","description":"CWE-639 Authorization Bypass Through User-Controlled Key","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"1443cd92-d354-46d2-9290-d812316ca43a","shortName":"Delinea","dateUpdated":"2025-07-02T19:46:25.837Z"},"references":[{"tags":["release-notes"],"url":"https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000060.htm"},{"tags":["release-notes"],"url":"https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000061.htm"},{"tags":["release-notes"],"url":"https://docs.delinea.com/online-help/secret-server-changelog/secret-server-change-log.htm?cshid=secret-server-changelog#Friday,_November_22,_2024"},{"tags":["vendor-advisory"],"url":"https://trust.delinea.com/?tcuUid=2b68edca-7930-438d-b960-2d6da07cdde9"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-02T15:58:09.266658Z","id":"CVE-2025-6942","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-02T15:58:13.977Z"}}]}}