CVE-2025-29846
portenable · portenable Multiple Products
A high-severity vulnerability has been identified in multiple portenable products, allowing authenticated attackers to view the status of all installed software packages.
Executive summary
A high-severity vulnerability has been identified in multiple portenable products, allowing authenticated attackers to view the status of all installed software packages. This information disclosure could enable an attacker to identify unpatched or vulnerable software on the system, significantly increasing the risk of a more severe follow-on attack. Immediate application of vendor-supplied security updates is required to mitigate this risk.
Vulnerability
The vulnerability exists within a CGI component of portenable software. A remote, authenticated attacker can send a specially crafted request to this component to elicit a detailed list of installed software packages and their current status, including version numbers. This flaw stems from improper access control, allowing any authenticated user, regardless of privilege level, to access sensitive system configuration information that should be restricted to administrators.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.2. While it does not directly allow for system compromise, the information disclosed is highly valuable for an attacker performing reconnaissance. By obtaining a complete list of installed software and versions, an attacker can cross-reference this information with public databases of known vulnerabilities to identify an effective attack vector. Successful exploitation significantly lowers the barrier for subsequent attacks, potentially leading to remote code execution, data breaches, or denial-of-service conditions.
Remediation
Immediate Action: Apply vendor security updates immediately to all affected portenable products. After patching, monitor for any further exploitation attempts and review historical access logs for signs of anomalous queries to the vulnerable CGI component.
Proactive Monitoring: Security teams should configure monitoring and alerting for unusual access patterns to the affected CGI endpoint. Specifically, look for multiple requests from non-administrative authenticated users or requests originating from unexpected IP addresses. Review web server logs for HTTP requests targeting the package status functionality.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) rule to block or restrict access to the vulnerable CGI script. Alternatively, modify web server access control lists (ACLs) to ensure that only trusted, privileged administrative accounts can access the endpoint.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity rating (CVSS 7.2), it is strongly recommended that organizations prioritize the immediate deployment of the security updates provided by portenable. Although this vulnerability is not currently listed on the CISA KEV catalog, the risk of it being used for targeted reconnaissance is significant. Patching this flaw is a critical step in preventing attackers from gaining the intelligence needed to launch more damaging and successful attacks against the organization's infrastructure.