{"id":12455,"date":"2025-06-12T13:26:58","date_gmt":"2025-06-12T11:26:58","guid":{"rendered":"https:\/\/clue.ch\/?p=12455"},"modified":"2025-06-12T16:07:40","modified_gmt":"2025-06-12T14:07:40","slug":"clue-deckt-auf-kritische-cve-entdeckt","status":"publish","type":"post","link":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/","title":{"rendered":"CLUE Discovers: Critical CVE Identified"},"content":{"rendered":"<span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span>\r\n<p>A few weeks ago, a customer approached us with the request to secure a business-critical application with our <a href=\"https:\\\/\\\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/services\/application-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managed Application Protection<\/a> Service. CLUE pursues a multi-level, risk-based approach that differs significantly from the industry standard: Before an application is integrated into our security infrastructure, we carry out a comprehensive attack surface analysis. This initial assessment enables us to define protection mechanisms that are precisely tailored to the target architecture &#8211; instead of being based on generic rule sets, as used in many standard market solutions.<\/p>\r\n\r\n\r\n\r\n<p>As part of the preliminary analysis, our security specialist Manuel Walder has identified a serious vulnerability in the application&#8217;s data flow. &nbsp;<strong>CVE\u20112025\u20112407 (CVSS 9.3)<\/strong>&nbsp;affects the Mobatime AMX MTAPI version 6, which is operated on IIS. Due to the lack of authentication and authorization controls in the Web API, an attacker can gain unrestricted access to all API functions.<\/strong><\/p>\r\n\r\n\r\n\r\n<p><strong>What is particularly critical is that conventional security solutions cannot detect or eliminate the vulnerability. The cause lies in the business logic of the application &#8211; an area that conventional protection mechanisms often do not cover.<\/strong><\/p>\r\n\r\n\r\n\r\n<p>After identifying the vulnerability, CLUE worked closely with the affected customer, the software manufacturer and the National Cyber Security Center (NCSC). The vulnerability was carefully validated and communicated in a coordinated disclosure process.  This intensive collaboration resulted in the official allocation of the identifier&nbsp;<a href=\"https:\\\/\\\/clue.ch\/\/clue.ch\/\/www.cve.org\/cverecord?id=CVE-2025-2407\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2025-2407<\/strong><\/a>&nbsp;and ensured that both technical and regulatory requirements were met &#8211; to protect all affected users. The entire process clearly shows that effective protection requires, above all, a deep understanding of the real risks.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Conclusion: Protection Begins with Awareness<\/strong><\/h3>\r\n\r\n\r\n\r\n<p>This incident illustrates how deceptive trust in security solutions can be when they are implemented without contextual knowledge. CLUE therefore consistently relies on a combined approach:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Attack Surface Analysis<\/strong>&nbsp;\u2013 precautionary, targeted, well-founded<\/li>\r\n\r\n\r\n\r\n<li><strong>Technical Vulnerability Analysis<\/strong>&nbsp;\u2013 with clear identification of risks as in CVE\u20112025\u20112407<\/li>\r\n\r\n\r\n\r\n<li><strong>CVD\u2011Coordination<\/strong>&nbsp;\u2013 Transparent and responsible disclosure, including involvement of government agencies<\/li>\r\n\r\n\r\n\r\n<li><strong>Tailored Policies&nbsp;<\/strong>\u2013 based on the specific architecture of the application<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>This is the only way to create a realistic risk profile and derive an effective security concept. Especially in times of highly automated attack scenarios, increasingly driven by artificial intelligence, this comprehensive approach is the key to sustainable cybersecurity. CLUE combines in-depth technical understanding with strategic foresight\u2014for effective protection even in highly networked, dynamic IT environments.<\/p>\r\n\r\n\r\n\r\n<p>The complete technical description of the vulnerability CVE-2025-2407 is available via the official&nbsp;<a class=\"\" href=\"https:\\\/\\\/clue.ch\/\/clue.ch\/\/www.cve.org\/cverecord?id=CVE-2025-2407\">CVE-Database<\/a>.<\/p>\r\n\r\n\r\n\r\n<p>What risks lurk in your business logic? Let us review your applications together\u2014before an attacker does. <a href=\"https:\\\/\\\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/contact\/\">Arrange a preliminary consultation now!<\/a><\/p>\r\n\r\n\r\n\r\n<p><\/p>\r\n<span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span>","protected":false},"excerpt":{"rendered":"<p>\ufeff A few weeks ago, a customer approached us with the request to secure a business-critical application with our Managed Application Protection Service. CLUE pursues a multi-level, risk-based approach that differs significantly from the industry standard: Before an application is integrated into our security infrastructure, we carry out a comprehensive attack surface analysis. This initial [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":12459,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[43,35,54],"tags":[],"class_list":["post-12455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-protection","category-clue-news","category-security-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CLUE Discovers: Critical CVE Identified<\/title>\n<meta name=\"description\" content=\"Clue discovers critical CVE in AMX MTAPI: Why business logic vulnerabilities often go unnoticed \u2013 and how targeted analysis provides real protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CLUE Discovers: Critical CVE Identified\" \/>\n<meta property=\"og:description\" content=\"Clue discovers critical CVE in AMX MTAPI: Why business logic vulnerabilities often go unnoticed \u2013 and how targeted analysis provides real protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/\" \/>\n<meta property=\"og:site_name\" content=\"CLUE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.instagram.com\/clue.security\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-12T11:26:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-12T14:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clue.ch\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"901\" \/>\n\t<meta property=\"og:image:height\" content=\"421\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Manuel Walder\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel Walder\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/\"},\"author\":{\"name\":\"Manuel Walder\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/person\/f9066b0f1dcb44fe6351641b4e7e2494\"},\"headline\":\"CLUE Discovers: Critical CVE Identified\",\"datePublished\":\"2025-06-12T11:26:58+00:00\",\"dateModified\":\"2025-06-12T14:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/\"},\"wordCount\":428,\"publisher\":{\"@id\":\"https:\/\/clue.ch\/#organization\"},\"image\":{\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png\",\"articleSection\":[\"Application Protection\",\"Clue News\",\"Security News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/\",\"url\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/\",\"name\":\"CLUE deckt auf: Kritische CVE entdeckt\",\"isPartOf\":{\"@id\":\"https:\/\/clue.ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png\",\"datePublished\":\"2025-06-12T11:26:58+00:00\",\"dateModified\":\"2025-06-12T14:07:40+00:00\",\"description\":\"Clue entdeckt kritische CVE in AMX MTAPI: Warum Business-Logik Schwachstellen oft unbemerkt bleiben \u2013 und wie gezielte Analyse echten Schutz schafft.\",\"breadcrumb\":{\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage\",\"url\":\"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png\",\"contentUrl\":\"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png\",\"width\":901,\"height\":421},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clue.ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CLUE Discovers: Critical CVE Identified\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clue.ch\/#website\",\"url\":\"https:\/\/clue.ch\/\",\"name\":\"CLUE\",\"description\":\"Cyber Secure\",\"publisher\":{\"@id\":\"https:\/\/clue.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clue.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/clue.ch\/#organization\",\"name\":\"CLUE Security Services\",\"url\":\"https:\/\/clue.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"contentUrl\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"width\":1,\"height\":1,\"caption\":\"CLUE Security Services\"},\"image\":{\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/clue.security\/\",\"https:\/\/www.linkedin.com\/company\/clue-security-services\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/person\/f9066b0f1dcb44fe6351641b4e7e2494\",\"name\":\"Manuel Walder\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7971edc73bbe910aa4828ad7dd36b2b2ffb8dfd24b3fa9418428473c53b4de12?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7971edc73bbe910aa4828ad7dd36b2b2ffb8dfd24b3fa9418428473c53b4de12?s=96&d=mm&r=g\",\"caption\":\"Manuel Walder\"},\"url\":\"https:\/\/clue.de\/en\/blog\/author\/mwalder\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CLUE Discovers: Critical CVE Identified","description":"Clue discovers critical CVE in AMX MTAPI: Why business logic vulnerabilities often go unnoticed \u2013 and how targeted analysis provides real protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\ufeff A few weeks ago, a customer approached us with the request to secure a business-critical application with our Managed Application Protection Service. CLUE pursues a multi-level, risk-based approach that differs significantly from the industry standard: Before an application is integrated into our security infrastructure, we carry out a comprehensive attack surface analysis. This initial&hellip;","og_locale":"en_GB","og_type":"article","og_title":"CLUE Discovers: Critical CVE Identified","og_description":"Clue discovers critical CVE in AMX MTAPI: Why business logic vulnerabilities often go unnoticed \u2013 and how targeted analysis provides real protection.","og_url":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/","og_site_name":"CLUE","article_publisher":"https:\/\/www.instagram.com\/clue.security\/","article_published_time":"2025-06-12T11:26:58+00:00","article_modified_time":"2025-06-12T14:07:40+00:00","og_image":[{"width":901,"height":421,"url":"https:\/\/clue.ch\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png","type":"image\/png"}],"author":"Manuel Walder","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Manuel Walder","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#article","isPartOf":{"@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/"},"author":{"name":"Manuel Walder","@id":"https:\/\/clue.ch\/#\/schema\/person\/f9066b0f1dcb44fe6351641b4e7e2494"},"headline":"CLUE Discovers: Critical CVE Identified","datePublished":"2025-06-12T11:26:58+00:00","dateModified":"2025-06-12T14:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/"},"wordCount":428,"publisher":{"@id":"https:\/\/clue.ch\/#organization"},"image":{"@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage"},"thumbnailUrl":"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png","articleSection":["Application Protection","Clue News","Security News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/","url":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/","name":"CLUE deckt auf: Kritische CVE entdeckt","isPartOf":{"@id":"https:\/\/clue.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage"},"image":{"@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage"},"thumbnailUrl":"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png","datePublished":"2025-06-12T11:26:58+00:00","dateModified":"2025-06-12T14:07:40+00:00","description":"Clue entdeckt kritische CVE in AMX MTAPI: Warum Business-Logik Schwachstellen oft unbemerkt bleiben \u2013 und wie gezielte Analyse echten Schutz schafft.","breadcrumb":{"@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#primaryimage","url":"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png","contentUrl":"https:\/\/clue.de\/wp-content\/uploads\/2025\/06\/Blogpost_06-2025-1.png","width":901,"height":421},{"@type":"BreadcrumbList","@id":"https:\/\/clue.de\/en\/blog\/clue-discovers-critical-cve-identified\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clue.ch\/"},{"@type":"ListItem","position":2,"name":"CLUE Discovers: Critical CVE Identified"}]},{"@type":"WebSite","@id":"https:\/\/clue.ch\/#website","url":"https:\/\/clue.ch\/","name":"CLUE","description":"Cyber Secure","publisher":{"@id":"https:\/\/clue.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clue.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/clue.ch\/#organization","name":"CLUE Security Services","url":"https:\/\/clue.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/","url":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","contentUrl":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","width":1,"height":1,"caption":"CLUE Security Services"},"image":{"@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/clue.security\/","https:\/\/www.linkedin.com\/company\/clue-security-services\/"]},{"@type":"Person","@id":"https:\/\/clue.ch\/#\/schema\/person\/f9066b0f1dcb44fe6351641b4e7e2494","name":"Manuel Walder","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.ch\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7971edc73bbe910aa4828ad7dd36b2b2ffb8dfd24b3fa9418428473c53b4de12?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7971edc73bbe910aa4828ad7dd36b2b2ffb8dfd24b3fa9418428473c53b4de12?s=96&d=mm&r=g","caption":"Manuel Walder"},"url":"https:\/\/clue.de\/en\/blog\/author\/mwalder\/"}]}},"_links":{"self":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/posts\/12455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/comments?post=12455"}],"version-history":[{"count":0,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/posts\/12455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/media\/12459"}],"wp:attachment":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/media?parent=12455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/categories?post=12455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/tags?post=12455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}