An authentication bypass vulnerability exists in GFI Kerio Control 9.4.5 due to insecure default proxy configuration and weak access control in the GFIAgent service. The non-transparent proxy on TCP port 3128 can be used to forward unauthenticated requests to internal services such as GFIAgent, bypassing firewall restrictions and exposing internal management endpoints. This enables unauthenticated attackers to access the GFIAgent service on ports 7995 and 7996, retrieve the appliance UUID, and issue administrative requests via the proxy. Exploitation results in full administrative access to the Kerio Control appliance.
History

Wed, 17 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Gfi
Gfi kerio Control
CPEs cpe:2.3:a:gfi:kerio_control:9.4.5:-:*:*:*:*:*:*
Vendors & Products Gfi
Gfi kerio Control
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 02 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Jul 2025 14:00:00 +0000

Type Values Removed Values Added
Description An authentication bypass vulnerability exists in GFI Kerio Control 9.4.5 due to insecure default proxy configuration and weak access control in the GFIAgent service. The non-transparent proxy on TCP port 3128 can be used to forward unauthenticated requests to internal services such as GFIAgent, bypassing firewall restrictions and exposing internal management endpoints. This enables unauthenticated attackers to access the GFIAgent service on ports 7995 and 7996, retrieve the appliance UUID, and issue administrative requests via the proxy. Exploitation results in full administrative access to the Kerio Control appliance.
Title GFI Kerio Control GFIAgent Authentication Bypass via Proxy Forwarding
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 9.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-07-02T20:26:39.881Z

Reserved: 2025-04-15T19:15:22.550Z

Link: CVE-2025-34069

cve-icon Vulnrichment

Updated: 2025-07-02T20:26:32.196Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-02T14:15:24.390

Modified: 2025-09-17T14:01:51.437

Link: CVE-2025-34069

cve-icon Redhat

No data.