Upstream information
CVE-2025-25207 at MITRE
Description
The Authorino service in the Red Hat Connectivity Link is the authorization service for zero trust API security. Authorino allows the users with developer persona to add callbacks to be executed to HTTP endpoints once the authorization process is completed. It was found that an attacker with developer persona access can add a large number of those callbacks to be executed by Authorino and as the authentication policy is enforced by a single instance of the service, this leada to a Denial of Service in Authorino while processing the post-authorization callbacks.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CVSS v3 Scores
| CVSS detail | CNA (Red Hat) |
| Base Score | 5.7 |
| Vector | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Attack Vector | Adjacent Network |
| Attack Complexity | Low |
| Privileges Required | Low |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality Impact | None |
| Integrity Impact | None |
| Availability Impact | High |
| CVSSv3 Version | 3.1 |
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
| Product(s) | Fixed package version(s) | References |
| Container suse/sl-micro/6.0/baremetal-os-container:latest | kernel-firmware-all >= 20241128-slfo.1.1_2.1
kernel-firmware-amdgpu >= 20241128-slfo.1.1_2.1
kernel-firmware-ath10k >= 20241128-slfo.1.1_2.1
kernel-firmware-ath11k >= 20241128-slfo.1.1_2.1
kernel-firmware-ath12k >= 20241128-slfo.1.1_2.1
kernel-firmware-atheros >= 20241128-slfo.1.1_2.1
kernel-firmware-bluetooth >= 20241128-slfo.1.1_2.1
kernel-firmware-bnx2 >= 20241128-slfo.1.1_2.1
kernel-firmware-brcm >= 20241128-slfo.1.1_2.1
kernel-firmware-chelsio >= 20241128-slfo.1.1_2.1
kernel-firmware-dpaa2 >= 20241128-slfo.1.1_2.1
kernel-firmware-i915 >= 20241128-slfo.1.1_2.1
kernel-firmware-intel >= 20241128-slfo.1.1_2.1
kernel-firmware-iwlwifi >= 20241128-slfo.1.1_2.1
kernel-firmware-liquidio >= 20241128-slfo.1.1_2.1
kernel-firmware-marvell >= 20241128-slfo.1.1_2.1
kernel-firmware-media >= 20241128-slfo.1.1_2.1
kernel-firmware-mediatek >= 20241128-slfo.1.1_2.1
kernel-firmware-mellanox >= 20241128-slfo.1.1_2.1
kernel-firmware-mwifiex >= 20241128-slfo.1.1_2.1
kernel-firmware-network >= 20241128-slfo.1.1_2.1
kernel-firmware-nfp >= 20241128-slfo.1.1_2.1
kernel-firmware-nvidia >= 20241128-slfo.1.1_2.1
kernel-firmware-platform >= 20241128-slfo.1.1_2.1
kernel-firmware-prestera >= 20241128-slfo.1.1_2.1
kernel-firmware-qcom >= 20241128-slfo.1.1_2.1
kernel-firmware-qlogic >= 20241128-slfo.1.1_2.1
kernel-firmware-radeon >= 20241128-slfo.1.1_2.1
kernel-firmware-realtek >= 20241128-slfo.1.1_2.1
kernel-firmware-serial >= 20241128-slfo.1.1_2.1
kernel-firmware-sound >= 20241128-slfo.1.1_2.1
kernel-firmware-ti >= 20241128-slfo.1.1_2.1
kernel-firmware-ueagle >= 20241128-slfo.1.1_2.1
kernel-firmware-usb-network >= 20241128-slfo.1.1_2.1
| |
Image SLE-Micro
Image SLE-Micro-Azure
Image SLE-Micro-BYOS
Image SLE-Micro-BYOS-Azure | python311-dnspython >= 2.4.2-2.1
| |
| SUSE Linux Enterprise Server 16.0 | govulncheck-vulndb >= 0.0.20250814T182633-160000.1.2
| Patchnames: SUSE Linux Enterprise Server 16.0 GA govulncheck-vulndb-0.0.20250814T182633-160000.1.2 |
| openSUSE Tumbleweed | govulncheck-vulndb >= 0.0.20250612T141001-1.1
| Patchnames: openSUSE-Tumbleweed-2025-15225 |
SUSE Timeline for this CVE
CVE page created: Tue Feb 25 00:00:28 2025
CVE page last modified: Wed Feb 18 20:40:42 2026