Cyber Posture

CVE-2025-2538

Critical

Published: 20 March 2025

Published
20 March 2025
Modified
10 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0091 75.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

Security Summary

CVE-2025-2538 is a hardcoded credential vulnerability (CWE-798) affecting Esri Portal for ArcGIS versions 11.4 and below, specifically within a particular deployment pattern. This flaw enables a remote unauthenticated attacker to gain administrative access to the system. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for high-impact compromise across confidentiality, integrity, and availability.

A remote unauthenticated attacker can exploit this vulnerability over the network without user interaction or privileges. Successful exploitation grants full administrative access, allowing the attacker to control the Portal for ArcGIS instance, potentially leading to data exfiltration, system modification, or further lateral movement within the affected environment.

Esri has addressed this issue in the Portal for ArcGIS Security 2025 Update 3 Patch, detailed at https://support.esri.com/en-us/patches-updates/2025/portal-for-arcgis-security-2025-update-3-patch. Security practitioners should apply this patch promptly to mitigate the risk, particularly for deployments matching the vulnerable pattern.

Details

CWE(s)
CWE-798

Affected Products

esri
portal for arcgis
≤ 11.4

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The hardcoded credential flaw in a public-facing ArcGIS Portal directly enables remote unauthenticated exploitation of the web application (T1190) to obtain and abuse valid administrative accounts (T1078) for full system control.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References