Cyber Posture

CVE-2025-27508

High

Published: 05 March 2025

Published
05 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0013 32.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.

Security Summary

CVE-2025-27508 affects Emissary, a peer-to-peer (P2P) based data-driven workflow engine developed by the National Security Agency. The vulnerability resides in the ChecksumCalculator class, which supports hashing and checksum generation using algorithms that are no longer recommended for secure cryptographic applications, such as SHA-1, CRC32, and SSDEEP. While these may suffice for non-security-critical tasks, their use in scenarios requiring strong cryptographic integrity can lead to risks like hash collisions or weak verification, tracked under CWE-327 (Broken Cryptographic Algorithms). The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and was published on March 5, 2025.

Attackers can exploit this vulnerability remotely over the network with low complexity, requiring no privileges, user interaction, or special setup. Exploitation targets the integrity (I:H) aspect, potentially allowing adversaries to manipulate data by generating collisions or bypassing checksum validations in Emissary workflows, without impacting confidentiality or availability. Any unauthenticated network actor interacting with Emissary instances using the affected ChecksumCalculator could achieve this, compromising the trustworthiness of data processing in P2P environments.

The GitHub security advisory (GHSA-hw43-fcmm-3m5g) and associated commit (da3a81a8977577597ff2a944820a5ae4e9762368) confirm the fix in Emissary version 8.24.0, recommending immediate upgrades to eliminate the weak algorithms. Practitioners should review deployments for prior versions and audit usage of ChecksumCalculator to ensure it aligns with security requirements.

Details

CWE(s)
CWE-327

MITRE ATT&CK Enterprise Techniques

T1565.002 Transmitted Data Manipulation Impact
Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

The vulnerability enables bypassing weak checksum validations (SHA-1, CRC32, SSDEEP) to generate collisions and manipulate data integrity in P2P workflows, directly facilitating transmitted data manipulation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References