CVE-2025-6724

Progress · Progress Chef Automate

A high-severity vulnerability has been identified in Progress Chef Automate, which could allow an unauthenticated attacker to gain administrative control over the system.

Executive summary

A high-severity vulnerability has been identified in Progress Chef Automate, which could allow an unauthenticated attacker to gain administrative control over the system. Successful exploitation of this flaw could lead to a complete compromise of the managed infrastructure, enabling the attacker to deploy malicious code, steal sensitive data, and disrupt critical business operations. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

The vulnerability is an authentication bypass flaw within the web interface of Progress Chef Automate. An unauthenticated, remote attacker can exploit this by sending a specially crafted HTTP request to the server. This request bypasses standard authentication checks, allowing the attacker to create an administrative session and gain complete control over the Chef Automate platform, including all managed nodes and stored secrets.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would have a severe impact on the business, as Chef Automate is a central component for infrastructure management and automation. An attacker with administrative access could deploy malicious configurations across the entire fleet of managed servers, leading to widespread system compromise, operational downtime, and data breaches. Specific risks include the theft of sensitive credentials stored within Chef, deployment of ransomware, and gaining a persistent foothold within the corporate network.

Remediation

Immediate Action: Apply vendor security updates immediately to upgrade all instances of Progress Chef Automate to version 4.0 or later. After patching, review all administrative user accounts and access logs for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Implement enhanced monitoring of the Chef Automate instance. Specifically, security teams should look for:

  • Anomalous or unexpected login attempts in access logs, particularly from unknown IP addresses.
  • Unusual or unauthorized changes to configurations, policies, or user roles.
  • Suspicious API requests or unexpected behavior from Chef clients checking into the server.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce the risk of exploitation:

  • Restrict network access to the Chef Automate web interface and API endpoints to a list of trusted IP addresses using a firewall.
  • Place the service behind a Web Application Firewall (WAF) with rules configured to inspect and block malicious HTTP requests.
  • Enforce multi-factor authentication (MFA) for all administrative accounts, if not already in place.

Exploitation status

Public Exploit Available: False (as of September 29, 2025)

Analyst recommendation

Due to the high CVSS score of 8.8 and the critical role of Chef Automate in infrastructure management, this vulnerability poses a significant and immediate threat to the organization. We strongly recommend that all affected instances be patched immediately. If patching is delayed, the compensating controls outlined above should be implemented as a matter of urgency. Organizations should treat this vulnerability as a top priority for remediation to prevent a potentially catastrophic system-wide compromise.