Release Date: September 17, 2025
Bulletin ID: AWCB-2025-37
Product: HySecure 7.x (Multiple Versions)

 

Executive Summary

Low Risk - No Immediate Action Required

Objective: This advisory notifies customers of known security vulnerabilities associated with HySecure, outlines our evaluation and analysis, and proposes a recommended action plan.

Key Points for System Administrators:

  • 125 new CVEs identified - assessed with minimal impact to HySecure deployments

  • No critical vulnerabilities require immediate attention in HySecure operations

  • Scheduled patching: October 2025 monthly release cycle (vulnerabilities identified after September 3)

  • Current deployments maintain security with existing configurations

Immediate Actions Required: None

Recommended Actions:

  • Schedule the October 2025 update during the standard maintenance window

  • Review mitigation factors below for specific vulnerabilities

  • Continue following standard security hardening practices


Vulnerability Assessment Summary

Assessment based on HySecure architecture and deployment context

 Remediation Path  Critical  High  Medium  Low  Info  Total  Admin Impact 
 Emergency Patch  0  0  0  0  0  0  No immediate action needed 
 Monthly Patch  0  2  122  0  0  124  Schedule September update 
 Not Applicable  0  0  0  0  0  0  Components not present 
 Deferred  0  1  0  0  0  1  Monitor future releases 

 

Risk Assessment Context:

Critical and high-severity vulnerabilities were assessed for their impact on the HySecure product. Based on our analysis, we have revised the severity of these vulnerabilities for HySecure deployments.

Severity Definitions:

  • Critical: Exploitable remotely with severe impact (RCE, privilege escalation)

  • High: High probability of exploitation or significant business impact

  • Medium: Exploitable under specific conditions; limited impact

  • Low: Low likelihood of exploitation; minor impact

  • Informational: No direct risk; potential hardening opportunities

 

Quick Reference for System Administrators

1. Do I Need to Take Action Today?

  • No - Continue normal operations

2. When Should I Schedule Updates?

  • October 2025 Monthly Release - Plan during next maintenance window

3. How Do I Verify My Environment is Secure?

  • Check HySecure version: The HySecure version and status can be checked from the management console dashboard. Make sure you are on the latest version.

  • Verify firewall rules: Confirm if only the required ports are exposed

  • Review access logs: Look for unusual connection patterns

  • Validate configuration: Run standard security audit checklist

4. What Components Are Affected?

  • cups (Print Service) - Not configured for remote connections in HySecure

  • systemd - Internal components with minimal exposure

  • Kernel-uek, MariaDB - Internal components not exposed to external networks

 

Detailed Vulnerability Analysis

High Severity Vulnerabilities: 3 → Revised Severity: low

1. cups (Print Service)

  • CVE IDs: CVE-2025-58060, CVE-2025-58364

  • CVE Details:

            CVE-2025-58060: Remote code execution vulnerability in the CUPS print service through malformed print job processing

            CVE-2025-58364: Authentication bypass in the CUPS service, allowing unauthorized print queue access

  • Original Severity: High
  • HySecure Revised Severity: low

    Why This Has Minimal Impact on HySecure:

  • Not configured for remote connections: CUPS service does not accept remote connections in HySecure configuration

  • Not exposed through web service: Print service not accessible via the HySecure web interface

  • Non-core functionality: Printing is not a core feature of the remote access gateway appliance

  • Network isolation: Service operates in isolated network segments

2. systemd

  • CVE ID: CVE-2025-4598

  • CVE Details:

            CVE-2025-4598: Privilege escalation vulnerability in systemd user service management

  • Original Severity: High

  • HySecure Revised Severity: low

Why This Has Minimal Impact on HySecure:

  • No unprivileged users: The System does not have unprivileged users who could exploit this vulnerability

  • Controlled environment: HySecure operates with controlled user access and privilege management


Medium Severity Vulnerabilities: 122 → Revised Severity: low

1. Kernel-uek (Oracle Enterprise Kernel)

  • CVE ID: CVE-2024-26726, CVE-2024-57883, CVE-2025-37948, CVE-2025-37958, CVE-2025-37963, CVE-2025-38000, CVE-2025-38001, CVE-2025-38003, CVE-2025-38004, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037, CVE-2025-38044, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052, CVE-2025-38058, CVE-2025-38061, CVE-2025-38066, CVE-2025-38068, CVE-2025-38072, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079, CVE-2025-38083, CVE-2025-38084, CVE-2025-38085, CVE-2025-38086, CVE-2025-38094, CVE-2025-38100, CVE-2025-38102, CVE-2025-38103, CVE-2025-38107, CVE-2025-38108, CVE-2025-38111, CVE-2025-38112, CVE-2025-38115, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38136, CVE-2025-38146, CVE-2025-38147, CVE-2025-38154, CVE-2025-38157, CVE-2025-38159, CVE-2025-38160, CVE-2025-38161, CVE-2025-38163, CVE-2025-38174, CVE-2025-38180, CVE-2025-38181, CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38200, CVE-2025-38206, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38222, CVE-2025-38229, CVE-2025-38231, CVE-2025-38245, CVE-2025-38249, CVE-2025-38251, CVE-2025-38263, CVE-2025-38273, CVE-2025-38280, CVE-2025-38285, CVE-2025-38293, CVE-2025-38298, CVE-2025-38305, CVE-2025-38310, CVE-2025-38312, CVE-2025-38319, CVE-2025-38320, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328, CVE-2025-38332, CVE-2025-38336, CVE-2025-38337, CVE-2025-38342, CVE-2025-38344, CVE-2025-38345, CVE-2025-38346, CVE-2025-38348, CVE-2025-38350, CVE-2025-38352, CVE-2025-38363, CVE-2025-38380, CVE-2025-38386, CVE-2025-38387, CVE-2025-38389, CVE-2025-38391, CVE-2025-38393, CVE-2025-38395, CVE-2025-38399, CVE-2025-38400, CVE-2025-38403, CVE-2025-38404, CVE-2025-38406, CVE-2025-38410, CVE-2025-38412, CVE-2025-38415, CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38424, CVE-2025-38430, CVE-2025-38498
  • CVE Details:

            Multiple kernel vulnerabilities: Various memory corruption, privilege escalation, and denial of service vulnerabilities in Oracle Enterprise Kernel subsystems

  • Original Severity: Medium

  • HySecure Revised Severity: low

    Why This Has Minimal Impact on HySecure:

  • Local access required: Listed CVEs require local access, specific configurations, or enabled features not present in HySecure

  • Not exposed: Features and configurations vulnerable to these CVEs are not enabled or exposed in the HySecure deployment

  • Controlled environment: HySecure operates in controlled network environments, reducing exploitation opportunities

2. MariaDB

  • CVE IDs: CVE-2025-30722, CVE-2025-30693, CVE-2023-52970, CVE-2023-52969, CVE-2023-52971
  • CVE Details:

            CVE-2025-30722: SQL injection vulnerability in MariaDB query processing

            CVE-2025-30693: Authentication bypass in MariaDB user management

CVE-2023-52970: Buffer overflow in MariaDB connection handling

CVE-2023-52969: Privilege escalation in MariaDB stored procedure execution

CVE-2023-52971: Denial of service vulnerability in MariaDB query optimization

  • Original Severity: Medium

  • HySecure Revised Severity: low

    Why This Has Minimal Impact on HySecure:

  • Not publicly exposed: MariaDB service is not exposed to the public internet or untrusted network segments

  • No direct access: Database not accessible directly by external users

  • Privileged access required: Listed vulnerabilities require high-privileged user access to exploit

  • Security architecture: HySecure prevents unprivileged users from gaining direct database access

  • Attack vector mitigation: Appliance security architecture mitigates attack vectors for these vulnerabilities

 

Administrator Action Plan

October 2025 Release Planning

  • Target Release Date: October 31, 2025

  • Maintenance Window Required: 2-4 hours (standard update process)

  • Security Hotfix ID: AH_OL9_CM_SF09


Pre-Update Checklist:

  • Backup current configuration: Navigate to Settings > General Settings > Backup & Restore. In the Backup section, select the option Backup User Settings Only and click Submit to download the User Backup file.

  • Verify system resources: Ensure adequate disk space and memory

  • Schedule maintenance window: Coordinate with stakeholders

  • Test connectivity: Confirm clients can reconnect post-update


Post-Update Verification:

  • Check service status: Log on to the Management console. Go to Diagnose > Services Status.

  • Verify client connectivity: Test from multiple client types

  • Review logs: Check for errors or warnings

  • Validate security settings: Run security configuration audit


Verification Commands:

1. Check HySecure version and status

  • The HySecure version and status can be checked from the management console dashboard

2. Verify if the security update is applied properly


Deferred Issue Monitoring

One vulnerability deferred to future OS release:

  • Component: systemd

  • Monitoring: Will be addressed in subsequent Linux distribution updates

  • Action: Continue standard patching cycles


Customer Guidance

Deployment Security:

  • Keep deployment updated with the latest HySecure versions and patches

  • Implement network segmentation - ensure HySecure components are not directly internet-accessible

  • Enable comprehensive logging and review access patterns regularly

  • Follow the principle of least privilege for accounts and services

  • Apply security hardening as documented in the HySecure Security Configuration Guide


Support and Contact Information

For Technical Questions:

  • Email: support@accops.com

  • Subject Line: "AWCB-2025-37 - $Your Question$"

  • Include: HySecure version, deployment details, specific concerns

For Patch Scheduling Assistance:

  • Contact your assigned Customer Success Manager

  • Reference the latest security hotfix for scheduling guidance

Emergency Security Issues:

  • Email: security@accops.com

  • Phone: Contact customer support for immediate escalation

  • Available: 24/7 through customer support channels


For the most current information and updates, visit: https://www.accops.com/product-software