Cyber Posture

CVE-2025-26492

High

Published: 11 February 2025

Published
11 February 2025
Modified
16 May 2025
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0001 0.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search compromised systems to find and obtain insecurely stored credentials.

Security Summary

CVE-2025-26492 is a vulnerability in JetBrains TeamCity versions prior to 2024.12.2, stemming from improper Kubernetes connection settings that could expose sensitive resources. Published on 2025-02-11, it carries a CVSS v3.1 base score of 7.7 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N) and maps to CWE-522.

The vulnerability can be exploited over the network by attackers with high privileges (PR:H), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful attacks enable high confidentiality (C:H) and integrity (I:H) impacts with a changed scope (S:C), allowing exposure and potential modification of sensitive resources tied to Kubernetes connections, but without availability disruption (A:N).

JetBrains addressed the issue in TeamCity 2024.12.2. Additional details on fixes and mitigations are available in the vendor advisory at https://www.jetbrains.com/privacy-security/issues-fixed/.

Details

CWE(s)
CWE-522

Affected Products

jetbrains
teamcity
≤ 2024.12.2

MITRE ATT&CK Enterprise Techniques

T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

The vulnerability stems from improper Kubernetes connection settings exposing sensitive resources (CWE-522: Insufficiently Protected Credentials), directly facilitating access to unsecured credentials stored in TeamCity integration settings.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References