CVE-2025-66956

Asseco SEE · SEE Live 2.0

Asseco SEE Live 2.0 contains insecure access control in its communication components, allowing remote attackers to access and execute attachments via computable URLs.

Executive summary

Insecure access controls in Asseco SEE Live 2.0 allow remote attackers to bypass security measures and access sensitive attachments through predictable URL patterns.

Vulnerability

This vulnerability affects the Contact Plan, E-Mail, SMS, and Fax components. Due to insecure access control and the use of computable (predictable) URLs, remote attackers can bypass intended authorization checks to download or execute file attachments.

Business impact

The CVSS score of 9.9 indicates a critical risk to data confidentiality and integrity. Attackers could systematically harvest sensitive documents, personal data, or corporate communications sent via the SEE Live platform, leading to significant regulatory non-compliance and reputational damage.

Remediation

Immediate Action: Apply the latest security updates provided by Asseco SEE for the Live 2.0 platform to implement robust authorization checks for all attachment access requests.

Proactive Monitoring: Monitor access logs for sequential or high-volume requests to attachment URLs, which may indicate an automated scraping attempt or exploitation of computable URLs.

Compensating Controls: Implement a reverse proxy or WAF that enforces session-based authentication before allowing access to the file-serving endpoints of the application.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations using Asseco SEE Live 2.0 for enterprise communications must address this insecure access control flaw immediately. The predictability of resource locations combined with weak authorization creates a significant data breach risk that can only be mitigated through the vendor's official security patches.