sapphireims CVE Vulnerabilities & Metrics

Focus on sapphireims vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About sapphireims Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with sapphireims. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total sapphireims CVEs: 11
Earliest CVE date: 11 Aug 2021, 21:15 UTC
Latest CVE date: 11 Aug 2021, 21:15 UTC

Latest CVE reference: CVE-2020-25566

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical sapphireims CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.99

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 7
7.0-8.9 4
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS sapphireims CVEs

These are the five CVEs with the highest CVSS scores for sapphireims, sorted by severity first and recency.

All CVEs for sapphireims

CVE-2020-25566 sapphireims vulnerability CVSS: 7.5 11 Aug 2021, 21:15 UTC

In SapphireIMS 5.0, it is possible to take over an account by sending a request to the Save_Password form as shown in POC. Notice that we do not require a JSESSIONID in this request and can reset any user’s password by changing the username to that user and password to base64(desired password).

CVE-2020-25565 sapphireims vulnerability CVSS: 7.5 11 Aug 2021, 21:15 UTC

In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.

CVE-2020-25564 sapphireims vulnerability CVSS: 6.5 11 Aug 2021, 21:15 UTC

In SapphireIMS 5.0, it is possible to create local administrator on any client with credentials of a non-privileged user by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature.

CVE-2020-25563 sapphireims vulnerability CVSS: 7.5 11 Aug 2021, 21:15 UTC

In SapphireIMS 5.0, it is possible to create local administrator on any client without requiring any credentials by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature and not having a JSESSIONID.

CVE-2020-25562 sapphireims vulnerability CVSS: 4.3 11 Aug 2021, 21:15 UTC

In SapphireIMS 5.0, there is no CSRF token present in the entire application. This can lead to CSRF vulnerabilities in critical application forms like account resent.

CVE-2020-25561 sapphireims vulnerability CVSS: 4.6 11 Aug 2021, 21:15 UTC

SapphireIMS 5 utilized default sapphire:ims credentials to connect the client to server. This credential is saved in ServerConf.config file in the client.

CVE-2020-25560 sapphireims vulnerability CVSS: 7.5 11 Aug 2021, 21:15 UTC

In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server. We also observed the same is true if the JSESSIONID is completely removed.

CVE-2017-16632 sapphireims vulnerability CVSS: 5.0 11 Aug 2021, 21:15 UTC

In SapphireIMS 4097_1, the password in the database is stored in Base64 format.

CVE-2017-16631 sapphireims vulnerability CVSS: 4.0 11 Aug 2021, 21:15 UTC

In SapphireIMS 4097_1, a guest user is able to change the password of an administrative user by utilizing an Insecure Direct Object Reference (IDOR) in the "Account Password Reset" functionality.

CVE-2017-16630 sapphireims vulnerability CVSS: 6.5 11 Aug 2021, 21:15 UTC

In SapphireIMS 4097_1, a guest user can create a local administrator account on any system that has SapphireIMS installed, because of an Insecure Direct Object Reference (IDOR) in the local user creation function.

CVE-2017-16629 sapphireims vulnerability CVSS: 5.0 11 Aug 2021, 21:15 UTC

In SapphireIMS 4097_1, it is possible to guess the registered/active usernames of the software from the errors it gives out for each type of user on the Login form. For "Incorrect User" - it gives an error "The application failed to identify the user. Please contact administrator for help." For "Correct User and Incorrect Password" - it gives an error "Authentication failed. Please login again."