Description
An authentication bypass vulnerability was reported in FileZ client application that could allow a local attacker with elevated permissions access to application data.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-6249, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-6249 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- https://capec.mitre.org/data/definitions/162.html
- https://capec.mitre.org/data/definitions/202.html
- https://capec.mitre.org/data/definitions/207.html
- https://capec.mitre.org/data/definitions/208.html
- https://capec.mitre.org/data/definitions/21.html
- https://capec.mitre.org/data/definitions/31.html
- https://capec.mitre.org/data/definitions/383.html
- https://capec.mitre.org/data/definitions/384.html
- https://capec.mitre.org/data/definitions/385.html
- https://capec.mitre.org/data/definitions/386.html
- https://capec.mitre.org/data/definitions/387.html
- https://capec.mitre.org/data/definitions/388.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-6249