Plattform
apache
Komponente
apache-cloudstack
Behoben in
4.19.3.0
4.20.1.0
CVE-2025-47713 describes a privilege escalation vulnerability affecting Apache CloudStack versions 4.10.0.0 through 4.20.0.0. A malicious Domain Admin user within the ROOT domain can exploit this flaw to reset the passwords of Admin role user accounts. This allows attackers to assume control of higher-privileged accounts, leading to potential compromise of the entire CloudStack environment. The vulnerability is resolved in version 4.20.1.0.
This vulnerability allows a malicious Domain Admin to escalate their privileges within the CloudStack environment. By resetting the passwords of Admin role user accounts, the attacker can effectively impersonate these users and gain access to sensitive APIs and resources. This could lead to a wide range of damaging consequences, including unauthorized access to data, modification of system configurations, denial of service, and ultimately, a complete compromise of the CloudStack infrastructure. The potential for data loss and disruption is significant, particularly in multi-tenant environments where multiple users rely on the CloudStack platform.
CVE-2025-47713 was publicly disclosed on 2025-06-10. Currently, there are no known public exploits or active campaigns targeting this vulnerability. It is not listed on the CISA KEV catalog at the time of writing. The vulnerability's impact is significant due to the potential for privilege escalation and widespread compromise within the CloudStack environment.
Organizations heavily reliant on Apache CloudStack for their cloud infrastructure are at risk. Specifically, deployments with a large number of Domain Admin users or those lacking robust access control policies are particularly vulnerable. Shared hosting environments utilizing CloudStack should also be assessed, as compromised Domain Admin accounts could impact multiple tenants.
• apache: Check CloudStack logs for unusual password reset activity, especially from the ROOT domain. Look for patterns indicating unauthorized access attempts.
journalctl -u cloudstack-management -g 'password reset'• apache: Audit user accounts and permissions within the ROOT domain to ensure least privilege is enforced.
# Example: Check user roles and permissions (CloudStack CLI or API)
# This requires familiarity with CloudStack's access control system.• generic web: Monitor CloudStack API endpoints for unauthorized access attempts, particularly those related to user management.
curl -I https://<cloudstack_host>/api/cloudstack/user/resetPassworddisclosure
Exploit-Status
EPSS
0.09% (25% Perzentil)
The primary mitigation for CVE-2025-47713 is to upgrade Apache CloudStack to version 4.20.1.0 or later, which contains the fix. If an immediate upgrade is not feasible, consider implementing stricter access controls and multi-factor authentication for Admin accounts to limit the impact of a potential compromise. Regularly review user permissions and audit logs to detect any suspicious activity. While not a direct fix, restricting network access to the CloudStack management interface can also reduce the attack surface.
Actualice Apache CloudStack a la versión 4.19.3.0 o 4.20.1.0. Estas versiones corrigen la vulnerabilidad de escalada de privilegios que permite a un administrador de dominio malicioso restablecer la contraseña de cuentas de administrador en el dominio raíz.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-47713 is a vulnerability in Apache CloudStack versions 4.10.0.0–4.20.1.0 allowing a malicious Domain Admin to reset Admin passwords, potentially gaining control.
If you are running Apache CloudStack versions 4.10.0.0 through 4.20.0.0, you are potentially affected by this vulnerability.
Upgrade Apache CloudStack to version 4.20.1.0 or later to resolve the vulnerability. Implement stricter access controls as an interim measure.
As of the current disclosure date, there are no confirmed reports of active exploitation, but the potential impact warrants immediate attention.
Refer to the official Apache CloudStack security advisory for detailed information and updates: [https://lists.cloudstack.apache.org/gmane/list/security/spamsg/138243.html](https://lists.cloudstack.apache.org/gmane/list/security/spamsg/138243.html)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.