Vulnerability Description
psPAS PowerShell module does not explicitly enforce TLS 1.2 within the 'Get-PASSAMLResponse' function during the SAML authentication process. An unauthenticated attacker in a 'Man-in-the-Middle' position could manipulate the TLS handshake and downgrade TLS to a deprecated protocol. Fixed in 7.0.209.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pspete | Pspas | >= 6.4.85, < 7.0.209 |
Related Weaknesses (CWE)
References
- https://github.com/pspete/psPAS/commit/2a8b1b4bc001bec9969ea512ed83386ed3e0b8f8#Patch
- https://github.com/pspete/psPAS/releases/tag/v7.0.209Release Notes
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-59270Third Party Advisory
FAQ
What is CVE-2025-59270?
CVE-2025-59270 is a vulnerability with a CVSS score of 3.1 (LOW). psPAS PowerShell module does not explicitly enforce TLS 1.2 within the 'Get-PASSAMLResponse' function during the SAML authentication process. An unauthenticated attacker in a 'Man-in-the-Middle' posit...
How severe is CVE-2025-59270?
CVE-2025-59270 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59270?
Check the references section above for vendor advisories and patch information. Affected products include: Pspete Pspas.