HomeVulnerabilityGrafana warns of max severity admin spoofing vulnerability

Grafana warns of max severity admin spoofing vulnerability

Grafana Labs is warning of a most severity vulnerability (CVE-2025-41115) in its Enterprise product that may be exploited to deal with new customers as directors or for privilege escalation.

The problem is just exploitable when SCIM (System for Cross-domain Id Administration) provisioning is enabled and configured.

Particularly, each ‘enableSCIM’ characteristic flag and ‘user_sync_enabled’ choices should be set to true to permit a malicious or compromised SCIM shopper to provision a person with a numeric externalId that maps to an inside account, together with directors.

Wiz

The externalId is a SCIM bookkeeping attribute utilized by the id supplier to trace customers.

As a result of Grafana mapped this worth on to its inside person.uid, a numeric externalId comparable to “1” may very well be interpreted as an current inside account, enabling impersonation or privilege escalation.

In keeping with Grafana’s documentation, SCIM provisioning is presently in ‘Public Preview’ and there’s restricted assist out there. Due to this, adoption of the characteristic is probably not widespread.

See also  Google's March 2025 Android Safety Replace Fixes Two Actively Exploited Vulnerabilities

Grafana is a knowledge visualization and monitoring platform utilized by a broad spectrum of organizations, from startups to Fortune 500 firms, for turning metrics, logs, and different operational knowledge into dashboards, alerts, and analytics.

“In particular instances this might permit the newly provisioned person to be handled as an current inside account, such because the Admin, resulting in potential impersonation or privilege escalation” – Grafana Labs

CVE-2025-41115 impacts Grafana Enterprise variations between 12.0.0 and 12.2.1 (when SCIM is enabled).

Grafana OSS customers aren’t impacted, whereas Grafana Cloud providers, together with Amazon Managed Grafana and Azure Managed Grafana, have already obtained the patches.

Directors of self-managed installations can handle the chance by making use of one of many following updates:

  • Grafana Enterprise model 12.3.0
  • Grafana Enterprise model 12.2.1
  • Grafana Enterprise model 12.1.3
  • Grafana Enterprise model 12.0.6

“In case your occasion is susceptible, we strongly advocate upgrading to one of many patched variations as quickly as attainable,” warns Grafana Labs.

See also  7-Zip MotW bypass exploited in zero-day assaults towards Ukraine

The flaw was found throughout inside auditing on November 4, and a security replace was launched roughly 24 hours later.

Throughout that point, Grafana Labs investigated and decided that the flaw had not been exploited in Grafana Cloud.

The general public launch of the security replace and the accompanying bulletin adopted on November 19.

Grafana customers are advisable to use out there patches as quickly as attainable or change the configuration (disable SCIM) to shut potential exploitation alternatives.

Final month, GreyNoise reported unusually elevated scanning exercise concentrating on an previous path traversal flaw in Grafana, which, because the researchers have famous beforehand, may very well be used for mapping uncovered cases in preparation for the disclosure of a brand new flaw.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular