CVE Alert: CVE-2025-11145 – CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. – enVision

CVE-2025-11145

HIGHNo exploitation known

Observable Discrepancy, Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. EnVision allows Account Footprinting.This issue affects enVision: before 250566.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc.
Product
enVision
Versions
0 lt 250566
CWE
CWE-203, CWE-203 Observable Discrepancy
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Published
2025-10-24T14:25:37.498Z
Updated
2025-10-24T14:25:37.498Z

AI Summary Analysis

Risk verdict

High risk: the vulnerability enables network-based account footprinting with high confidentiality impact, warranting prompt attention and patching when available.

Why this matters

Exposed account-lookup capabilities facilitate discovery of valid usernames and sensitive personal data, aiding targeted phishing, credential stuffing, and social engineering. In organisations with centralized EnVision deployments, this can scale across many users, amplifying breach risk and privacy violations.

Most likely attack path

An attacker can reach an internet- or intranet-facing EnVision instance, use a network-based probe to enumerate accounts without privileges or user interaction, and then leverage the findings for further access or data exfiltration. The low attack complexity and no required user interaction heighten the likelihood of automated probing, with defender-preconditions mainly consisting of reachable authentication endpoints and an unpatched build.

Who is most exposed

Exposure is greatest in organisations running EnVision in broadly accessible segments (internet-facing dashboards or poorly segmented networks) where automated scanners can reach authentication interfaces and enumerate user data.

Detection ideas

  • Spikes in authentication-related probe traffic from single or few IPs.
  • Repeated requests that enumerate usernames or expose account-like identifiers.
  • Anomalous responses to authentication/lookup endpoints (unexpected data in responses, inconsistent error messages).
  • Correlation of enumeration patterns with login failures or data exfiltration attempts.
  • WAF/log alerts triggered by abnormal URL patterns targeting user lists.

Mitigation and prioritisation

  • Apply vendor-published patch or fixed build promptly; verify deployment to all environments.
  • Implement rate-limiting and strict authentication controls on enumeration endpoints; enable MFA.
  • Disable or obscure verbose account information in error messages; enforce account lockout policies after failed attempts.
  • Network segmentation and access controls to limit exposure of EnVision interfaces.
  • Update change-management tickets, schedule testing in a staging environment, and monitor post-deployment for anomaly signals.

If KEV indicates active exploitation or EPSS ≥ 0.5, treat as priority 1.


Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features