{"id":60988,"date":"2025-01-29T21:39:53","date_gmt":"2025-01-29T18:39:53","guid":{"rendered":"https:\/\/cvefeed.io\/vuln\/detail\/CVE-2025-24527"},"modified":"2025-01-29T21:39:53","modified_gmt":"2025-01-29T18:39:53","slug":"cve-2025-24527-akamai-enterprise-application-access-eaa-authentication-bypass-vulnerability","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2025-24527-akamai-enterprise-application-access-eaa-authentication-bypass-vulnerability\/","title":{"rendered":"CVE-2025-24527 &#8211; Akamai Enterprise Application Access (EAA) Authentication Bypass Vulnerability"},"content":{"rendered":"<p class=\"card-text\"> The following table lists the changes that have been made to the <code>CVE-2025-24527<\/code> vulnerability over time. <\/p>\n<p class=\"card-text\"> Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability&#8217;s severity, exploitability, or other characteristics. <\/p>\n<div class=\"p-3 \">\n<ul class=\"acitivity-timeline-2 list-unstyled mb-0\">\n<li>\n<h6 class=\"fs-14\">New CVE Received by <a href=\"https:\/\/cvefeed.io\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"aecdd8cbeec3c7dadccb80c1dcc9\" target=\"_blank\" rel=\"noopener\">[email&nbsp;protected]<\/a><\/h6>\n<p>Jan. 29, 2025<\/p>\n<div class=\"table-responsive\">\n<table class=\"table table-responsive table-bordered table-hover table-condensed\">\n<thead>\n<tr>\n<th scope=\"col\">Action<\/th>\n<th scope=\"col\">Type<\/th>\n<th scope=\"col\">Old Value<\/th>\n<th scope=\"col\">New Value<\/th>\n<\/tr>\n<\/thead>\n<tbody readability=\"5\">\n<tr readability=\"4\">\n<td>Added<\/td>\n<td>Description<\/td>\n<td><\/td>\n<td>An issue was discovered in Akamai Enterprise Application Access (EAA) before 2025-01-17. If an admin knows another tenant&#8217;s 128-bit connector GUID, they can execute debug commands on that connector.<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>Added<\/td>\n<td>CVSS V3.1<\/td>\n<td><\/td>\n<td>AV:N\/AC:H\/PR:H\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td>\n<\/tr>\n<tr>\n<td>Added<\/td>\n<td>CWE<\/td>\n<td><\/td>\n<td>CWE-732<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>Added<\/td>\n<td>Reference<\/td>\n<td><\/td>\n<td>https:\/\/techdocs.akamai.com\/eaa\/changelog<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>Added<\/td>\n<td>Reference<\/td>\n<td><\/td>\n<td>https:\/\/techdocs.akamai.com\/eaa\/changelog\/january-29-2024<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The following table lists the changes that have been made to the CVE-2025-24527 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability&#8217;s severity, exploitability, or other characteristics. New CVE Received by [email&nbsp;protected] Jan. 29, 2025 Action &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-60988","post","type-post","status-publish","format-standard","hentry","category-29"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=60988"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60988\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=60988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=60988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=60988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}