Home

Description

EDB Hybrid Manager contains a flaw that allows an unauthenticated attacker to directly access certain gRPC endpoints. This could allow an attacker to read potentially sensitive data or possibly cause a denial-of-service by writing malformed data to certain gRPC endpoints. This flaw has been remediated in EDB Hybrid Manager 1.3.3, and customers should consider upgrading to 1.3.3 as soon as possible. The flaw is due to a misconfiguration in the Istio Gateway, which manages authentication and authorization for the affected endpoints. The security policy relies on an explicit definition of required permissions in the Istio Gateway configuration, and the affected endpoints were not defined in the configuration. This allowed requests to bypass both authentication and authorization within a Hybrid Manager service. All versions of Hybrid Manager - LTS should be upgraded to 1.3.3, and all versions of Hybrid Manager - Innovation should be upgraded to 2025.12.

PUBLISHED Reserved 2025-12-04 | Published 2025-12-15 | Updated 2025-12-15 | Assigner EDB




HIGH: 7.0CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H

Problem types

CWE-862 Missing Authorization

CWE-306 Missing Authentication for Critical Function

Product status

Default status
affected

1.3 (semver) before 1.3.3
affected

1.2 (semver)
affected

Default status
affected

2025 (custom) before 2025.12
affected

References

www.enterprisedb.com/docs/security/advisories/cve202514038/

cve.org (CVE-2025-14038)

nvd.nist.gov (CVE-2025-14038)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.