Critical ControlID iDSecure Flaws Allow Network Pivoting, Data Theft

CISA warns of critical vulnerabilities in ControlID iDSecure On-premises software, enabling authentication bypass, SSRF, and SQL injection attacks. Urgent patching required.
critical-controlid-idsecure-flaws-allow-network-pivoting-data-theft critical-controlid-idsecure-flaws-allow-network-pivoting-data-theft

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over three critical vulnerabilities discovered in ControlID’s iDSecure On-premises software, a widely deployed global access management platform used in commercial and critical infrastructure sectors. The urgent advisory, identified as ICSA-25-175-05, warns that these security flaws could enable threat actors to bypass authentication mechanisms, pivot deeper into internal networks, and potentially exfiltrate sensitive data.

Trio of Critical Flaws Unveiled

According to the CISA advisory, the vulnerabilities—improper authentication (CVE-2025-49851), server-side request forgery (SSRF, CVE-2025-49852), and SQL injection (CVE-2025-49853)—carry a maximum CVSS v4 score of 9.3, indicating a critical risk level. The affected versions of ControlID iDSecure On-premises software include 4.7.48.0 and earlier, with no evidence that cloud-based deployments are impacted.

Attack Vectors and Potential Impact

Cybersecurity researchers have outlined the following attack scenarios:

  • Improper authentication allows attackers to bypass login mechanisms and gain unauthorized access to restricted functions or data.
  • SSRF enables threat actors to make arbitrary requests from the vulnerable server, potentially pivoting deeper into internal networks or enumerating internal resources.
  • SQL injection could let attackers execute malicious queries against the backend database—altering logs, modifying permissions, or exfiltrating sensitive information such as audit logs or user lists.

Cybersecurity professional analyzing critical software vulnerabilities
Source: Pexels Image

Mitigation and Remediation Steps

Windows administrators and cybersecurity teams responsible for managing ControlID iDSecure On-premises deployments are urged to take immediate action to mitigate these critical vulnerabilities. CISA recommends applying the vendor-provided security updates or implementing appropriate workarounds until patches can be deployed. Additionally, organizations should review their access control policies, monitor for suspicious activity, and ensure that robust incident response plans are in place.

Industry-Wide Implications

The discovery of these critical flaws in ControlID’s widely used access management platform underscores the importance of continuous vulnerability assessment and prompt patching cycles. As threat actors increasingly target software supply chains and common security frameworks, organizations must remain vigilant in identifying and addressing potential weaknesses before they can be exploited. The ControlID iDSecure vulnerabilities serve as a stark reminder that even trusted security solutions can introduce significant risks if left unpatched or improperly configured.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use