Home

Description

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

PUBLISHED Reserved 2025-10-29 | Published 2025-11-10 | Updated 2025-11-12 | Assigner Mandiant




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA Known Exploited Vulnerability

Date added 2025-11-12 | Due date 2025-12-03

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-284: Improper Access Control

Product status

Default status
unaffected

Any version before 16.7.10368.56560
affected

Credits

Stallone D’Souza, Mandiant finder

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-12480 government-resource

github.com/...Disclosures/blob/master/2025/MNDT-2025-0008.md third-party-advisory

www.triofox.com/ product

access.triofox.com/releases_history/ release-notes

cloud.google.com/...nce/triofox-vulnerability-cve-2025-12480 third-party-advisory

cve.org (CVE-2025-12480)

nvd.nist.gov (CVE-2025-12480)

Download JSON