CVE-2025-4680

| EUVD-2025-17644 HIGH
Improper Input Validation (CWE-20)
2025-06-10 80f39f49-2521-4ee7-9e17-af5d55e8032f
8.6
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
A

Lifecycle Timeline

6
Analysis Updated
Apr 16, 2026 - 06:43 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
Patch available
Apr 16, 2026 - 05:29 EUVD
1.4.0
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17644
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
CVE Published
Jun 10, 2025 - 09:15 nvd
HIGH 8.6

DescriptionNVD

Improper Input Validation vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects upKeeper Instant Privilege Access: before 1.4.0.

AnalysisAI

CVE-2025-4680 is an improper input validation vulnerability in upKeeper Solutions' upKeeper Instant Privilege Access that allows attackers with local access and low privileges to bypass access control security levels and achieve high-impact confidentiality, integrity, and availability violations. Versions before 1.4.0 are affected. With a CVSS score of 8.6 and local attack vector requiring user interaction, this represents a significant privilege escalation risk for organizations using this privileged access management solution, particularly if KEV status indicates active exploitation or public POC availability.

Technical ContextAI

The vulnerability stems from CWE-20 (Improper Input Validation), a fundamental weakness where upKeeper Instant Privilege Access fails to properly validate and sanitize input before enforcing access control decisions. This likely occurs in the privilege escalation or session management code paths where security context or authorization tokens are parsed without sufficient validation, allowing attackers to inject malicious input that corrupts the access control state. The product (CPE: likely vendor:upkeeper OR similar) implements role-based or attribute-based access control (RBAC/ABAC) mechanisms that are bypassable through crafted input. The vulnerability affects the authentication/authorization layer rather than underlying cryptography, making it a logic-level flaw rather than a cryptographic weakness.

RemediationAI

Immediate action: Upgrade upKeeper Instant Privilege Access to version 1.4.0 or later. If immediate patching is not feasible, implement compensating controls: (1) Restrict local console/RDP access to trusted administrative personnel only; (2) Enforce multi-factor authentication on privilege escalation workflows; (3) Disable user interaction-based privilege elevation where possible (enforce non-interactive modes); (4) Monitor audit logs for abnormal privilege escalation patterns (CWE-20 bypasses often generate suspicious input patterns); (5) Isolate upKeeper instances on network segments with restricted lateral movement. Vendor advisory links should be obtained from upKeeper Solutions' security portal or CISA KEV catalog if this CVE has been flagged for active exploitation. Patch testing should occur in non-production environments first, given the critical nature of privilege access management systems.

Share

CVE-2025-4680 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy