Published:2025/08/27  Last Updated:2025/08/27

JVN#99577552
Multiple vulnerabilities in SS1

Overview

SS1 provided by DOS Co., Ltd. contains multiple vulnerabilities.

Products Affected

CVE-2025-46409, CVE-2025-52460, CVE-2025-53396, CVE-2025-53970, CVE-2025-54762, CVE-2025-54819, CVE-2025-58072, CVE-2025-58081

  • SS1 Ver.16.0.0.10 and earlier (Media version:16.0.0a and earlier)
CVE-2025-52460, CVE-2025-53970, CVE-2025-54819, CVE-2025-58072
  • SS1 Cloud Ver.2.1.3 and earlier
The developer states as follows:
CVE-2025-52460, CVE-2025-53970, and CVE-2025-54762 are affected under Windows environment only.
CVE-2025-53396, CVE-2025-58072, and CVE-2025-58081 are affected under MacOS environment only.

Description

SS1 provided by provided by DOS Co., Ltd. contains multiple vulnerabilities listed below.

  • Inadequate encryption strength(CWE-326
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 8.7
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score 7.5
    • CVE-2025-46409
  • Files or directories accessible to external parties(CWE-552
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 6.9
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Base Score 5.3
    • CVE-2025-52460
  • Incorrect permission assignment for critical resource(CWE-732
    • CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 7.3
    • CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score 7.0
    • CVE-2025-53396
  • Unrestricted upload of file with dangerous type(CWE-434
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
    • CVE-2025-53970, CVE-2025-54762
  • Path traversal(CWE-22
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N Base Score 7.1
    • CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Base Score 6.5
    • CVE-2025-54819
  • Path traversal(CWE-22
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 8.7
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score 7.5
    • CVE-2025-58072
  • Use of hard-coded password(CWE-259
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 8.7
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score 7.5
    • CVE-2025-58081

Impact

  • A function that requires authentication may be accessed by a remote attacker (CVE-2025-46409)
  • Uploaded files and SS1 configuration files may be accessed by a remote attacker (CVE-2025-52460)
  • Root privileges may be obtained by users who can log in to a client terminal (CVE-2025-53396)
  • Arbitrary files may be uploaded and arbitrary OS commands may be executed with SYSTEM privileges (CVE-2025-53970, CVE-2025-54762)
  • Legitimate files may be overwritten by a remote attacker (CVE-2025-54819)
  • Arbitrary files may be viewed by a remote attacker (CVE-2025-58072)
  • Arbitrary files may be viewed with root privileges by a remote attacker (CVE-2025-58081)

Solution

Update the software
Update software to the latest version according to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

CVE-2025-46409, CVE-2025-52460, CVE-2025-53970, CVE-2025-54762, CVE-2025-54819
Ruslan Sayfiev, Denis Faiustov and Masahiro Kawada of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

CVE-2025-53396, CVE-2025-58072, CVE-2025-58081
Masahiro Kawada of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-46409
CVE-2025-52460
CVE-2025-53396
CVE-2025-53970
CVE-2025-54762
CVE-2025-54819
CVE-2025-58072
CVE-2025-58081
JVN iPedia JVNDB-2025-000064