Home

Description

SOCA Access Control System 180612 contains multiple insecure direct object reference vulnerabilities that allow attackers to access sensitive user credentials. Attackers can retrieve authenticated and unauthenticated user password hashes and pins through unprotected endpoints like Get_Permissions_From_DB.php and Ac10_ReadSortCard.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Authorization Bypass Through User-Controlled Key

Product status

180612
affected

170000
affected

141007
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5517.php exploit

www.exploit-db.com/exploits/46832 (ExploitDB-46832) exploit

www.socatech.com (SOCA Technology Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5517.php (Zero Science Lab Disclosure (ZSL-2019-5517)) third-party-advisory

cve.org (CVE-2018-25129)

nvd.nist.gov (CVE-2018-25129)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.