CVE-2025-4378

| EUVD-2025-19092 CRITICAL
2025-06-24 [email protected]
10.0
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low

Lifecycle Timeline

6
Analysis Updated
Apr 16, 2026 - 05:53 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
20.06.2025
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19092
CVE Published
Jun 24, 2025 - 17:15 nvd
CRITICAL 10.0

DescriptionNVD

Cleartext Transmission of Sensitive Information, Use of Hard-coded Credentials vulnerability in Ataturk University ATA-AOF Mobile Application allows Authentication Abuse, Authentication Bypass.This issue affects ATA-AOF Mobile Application: before 20.06.2025.

AnalysisAI

CVE-2025-4378 is a critical authentication vulnerability in Ataturk University's ATA-AOF Mobile Application that combines cleartext transmission of sensitive information with hard-coded credentials, allowing unauthenticated attackers over the network to bypass authentication and abuse user accounts. All versions before 20.06.2025 are affected with a perfect CVSS 3.1 score of 10.0, indicating maximum severity across confidentiality, integrity, and availability dimensions.

Technical ContextAI

The vulnerability stems from two root causes classified under CWE-319 (Cleartext Transmission of Sensitive Information): (1) transmission of authentication credentials in plaintext over the network without encryption, and (2) use of hard-coded credentials embedded in the mobile application binary. The ATA-AOF Mobile Application likely transmits login tokens, API keys, or credentials via HTTP instead of HTTPS, or stores hard-coded service account credentials in the application code that can be extracted through reverse engineering. This affects the authentication layer of a university enrollment/academic services platform, where credential compromise directly enables account takeover and impersonation of legitimate users (students, faculty, administrators).

RemediationAI

Immediate actions: (1) Update ATA-AOF Mobile Application to version 20.06.2025 or later immediately upon release; (2) Force all users to update via app store mandatory update mechanism; (3) Rotate all hard-coded credentials embedded in previous application versions and invalidate any credentials transmitted in cleartext; (4) Implement server-side rate limiting and anomaly detection on authentication endpoints to detect credential stuffing attacks; (5) Deploy network-level monitoring to identify cleartext credential transmission. Long-term remediation: (6) Enforce HTTPS/TLS 1.2+ for all API communication with certificate pinning in the mobile app; (7) Remove all hard-coded credentials from application code and transition to secure credential management (OAuth2, API tokens stored in secure storage); (8) Conduct security code review and SAST scanning of the patched version before release; (9) Implement certificate-based or multi-factor authentication for sensitive operations. Patch availability: Update to version 20.06.2025 or later when available from official Ataturk University application distribution channels.

Share

CVE-2025-4378 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy