CVE-2025-25235
Omnissa · Omnissa Secure Email Gateway (SEG)
A high-severity Server-Side Request Forgery (SSRF) vulnerability has been identified in the Omnissa Secure Email Gateway (SEG).
Executive summary
A high-severity Server-Side Request Forgery (SSRF) vulnerability has been identified in the Omnissa Secure Email Gateway (SEG). This flaw could allow a remote, unauthenticated attacker to force the email gateway server to make unauthorized requests to internal network resources, potentially leading to sensitive information disclosure, internal network scanning, and further system compromise. Organizations are urged to apply the vendor-provided security patch immediately to mitigate this significant risk.
Vulnerability
This vulnerability is a Server-Side Request Forgery (SSRF) flaw. An attacker can exploit this by sending a specially crafted request to the Secure Email Gateway, likely embedded within an email or through an exposed web component. The SEG server fails to properly validate a user-supplied URL before fetching it, causing the server to make a network request to an arbitrary destination chosen by the attacker. This allows the attacker to use the trusted email gateway server as a proxy to interact with systems on the internal network, which are normally not accessible from the internet.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.6. The business impact is significant due to the critical role of an email gateway, which typically resides in a network DMZ with access to both the internet and the internal corporate network. Successful exploitation could lead to the exfiltration of confidential data from internal file shares, databases, or cloud metadata services. An attacker could also use this vulnerability to scan the internal network for other vulnerable systems, pivot to other hosts, and establish a deeper foothold within the organization, posing a severe risk to data confidentiality, integrity, and overall network security.
Remediation
Immediate Action: Apply the vendor-provided security update to upgrade all instances of Omnissa Secure Email Gateway (SEG) to version 2 or later. After patching, review server access logs and outbound firewall logs for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes inspecting outbound network traffic from SEG servers for unusual requests to internal IP ranges (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) or to cloud metadata endpoints (e.g., 169.254.169.254). Application logs on the SEG should be reviewed for anomalous URL requests or error messages indicating connection attempts to unexpected internal destinations.
Compensating Controls: If immediate patching is not feasible, implement strict egress filtering rules on the firewall protecting the SEG server. Block all outbound traffic from the SEG to the internal network, except for what is explicitly required for its operation (e.g., connections to specific internal mail servers). A Web Application Firewall (WAF) can also be deployed in front of the SEG to inspect and block malicious requests attempting to trigger the SSRF vulnerability.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the high severity rating of 8.6 and the critical placement of the Secure Email Gateway within the network perimeter, we strongly recommend that organizations treat this vulnerability with extreme urgency. The potential for data exfiltration and internal network compromise is substantial. All vulnerable instances of Omnissa SEG should be patched immediately. Although this CVE is not currently on the CISA KEV catalog, vulnerabilities of this type are prime candidates for inclusion if widespread exploitation occurs. Proactive patching is the most effective strategy to prevent compromise.