Description
Agiloft Release 28 downloads critical system packages over an insecure HTTP connection. An attacker in a Man-In-the-Middle position could replace or modify the contents of the download URL. Users should upgrade to Agiloft Release 30.
Problem types
CWE-494 Download of Code Without Integrity Check
Product status
Any version before Release 30
Release 30
Credits
Matthew Galligan, CISA Rapid Action Force (RAF)
References
wiki.agiloft.com/display/HELP/What's+New:+CVE+Resolution (url)
raw.githubusercontent.com/...IT/white/2025/va-25-239-01.json (url)
www.cve.org/CVERecord?id=CVE-2025-35115 (url)