There is a SQL injection issue in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is "LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 26 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | There is a SQL injection issue in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is "LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1. | |
Title | [#BUG-000172669 ArcGIS Monitor has a security vulnerability] | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Esri
Published: 2025-02-26T19:28:51.480Z
Updated: 2025-02-27T20:48:55.628Z
Reserved: 2025-02-26T18:39:12.598Z
Link: CVE-2025-1726

Updated: 2025-02-27T20:47:46.376Z

Status : Received
Published: 2025-02-26T20:15:13.510
Modified: 2025-02-26T20:15:13.510
Link: CVE-2025-1726

No data.