Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-41012

CVE-2025-41012: Tcman Gim Auth Bypass Vulnerability

CVE-2025-41012 is an authentication bypass flaw in Tcman Gim v11 that allows unauthenticated attackers to enumerate users via the PDAWebService endpoint. This article covers technical details, affected versions, and fixes.

Updated: January 22, 2026

CVE-2025-41012 Overview

CVE-2025-41012 is a high-severity unauthorized access vulnerability affecting TCMAN GIM v11 version 20250304. This vulnerability enables unauthenticated attackers to perform user enumeration attacks through the SOAP web service interface. By manipulating the pda:userId and pda:newPassword parameters in conjunction with the soapaction UnlockUser request to /WS/PDAWebService.asmx, attackers can determine whether specific user accounts exist on the system.

This vulnerability is classified as CWE-862 (Missing Authorization), indicating that the affected endpoint fails to implement proper access control mechanisms before exposing sensitive information about user account existence.

Critical Impact

Unauthenticated attackers can enumerate valid user accounts on the system, enabling targeted credential attacks, social engineering campaigns, or preparation for more sophisticated intrusions.

Affected Products

  • TCMAN GIM v11 version 20250304
  • tcman gim (all affected versions per CPE: cpe:2.3:a:tcman:gim:*:*:*:*:*:*:*:*)

Discovery Timeline

  • 2025-12-02 - CVE-2025-41012 published to NVD
  • 2025-12-03 - Last updated in NVD database

Technical Details for CVE-2025-41012

Vulnerability Analysis

This vulnerability represents a Missing Authorization flaw (CWE-862) in the TCMAN GIM web service layer. The affected endpoint /WS/PDAWebService.asmx exposes the UnlockUser SOAP action without implementing proper authentication or authorization checks. The service responds differently based on whether the queried user account exists, creating an oracle that attackers can leverage for user enumeration.

The CVSS 4.0 score of 8.7 (HIGH) reflects the network-accessible attack vector with no authentication requirements and high confidentiality impact. The CVSS vector string is: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

According to EPSS data from 2025-12-16, this vulnerability has a 0.066% probability of exploitation with a percentile ranking of 20.6, indicating relatively lower exploitation likelihood in the wild compared to other vulnerabilities.

Root Cause

The root cause of CVE-2025-41012 lies in the missing authorization checks within the PDAWebService.asmx web service. The UnlockUser SOAP action processes requests containing pda:userId and pda:newPassword parameters without first verifying that the requestor has appropriate permissions to perform this operation or even access user information. The service's error handling or response behavior varies based on user existence, creating an information disclosure channel that attackers can exploit.

Attack Vector

The attack vector for CVE-2025-41012 is network-based, requiring no authentication or user interaction. An attacker can craft malicious SOAP requests targeting the /WS/PDAWebService.asmx endpoint with the UnlockUser action. By iterating through potential usernames in the pda:userId parameter and analyzing the differential responses, attackers can build a list of valid user accounts.

The attack involves sending SOAP requests to the vulnerable endpoint with the soapaction UnlockUser header. The attacker supplies arbitrary values for pda:userId (the target username to enumerate) and pda:newPassword parameters. The service response differs based on whether the specified user exists, allowing the attacker to distinguish between valid and invalid usernames. This enumeration technique can be automated to rapidly identify all valid user accounts in the system, which can then be used for targeted password attacks or social engineering.

Detection Methods for CVE-2025-41012

Indicators of Compromise

  • Unusual volume of SOAP requests to /WS/PDAWebService.asmx with UnlockUser action
  • Multiple sequential requests with varying pda:userId parameter values from the same source
  • HTTP requests containing soapaction: UnlockUser headers from untrusted or external sources
  • Failed authentication attempts for accounts discovered through enumeration
  • Automated scanning patterns targeting the PDAWebService endpoint

Detection Strategies

Organizations should implement web application firewall (WAF) rules to monitor and alert on suspicious patterns targeting the /WS/PDAWebService.asmx endpoint. Log analysis should focus on identifying high-frequency requests to this endpoint, particularly those with systematically varying pda:userId parameters. Security teams should correlate these events with subsequent authentication attempts to detect reconnaissance-to-attack progression.

Network intrusion detection systems (IDS) can be configured with signatures to detect SOAP requests containing the UnlockUser action targeting TCMAN GIM installations. Additionally, implementing rate limiting on the affected endpoint can help throttle enumeration attempts while alerting security teams to potential attacks.

Monitoring Recommendations

Security teams should enable detailed logging for the TCMAN GIM web service, capturing all requests to /WS/PDAWebService.asmx. Implement SIEM rules to alert on enumeration patterns, such as more than 10 requests to the UnlockUser action within a 60-second window from a single source IP. Monitor for requests originating from unexpected geographic locations or known malicious IP ranges. Consider implementing network segmentation to limit access to the web service endpoint from trusted networks only.

How to Mitigate CVE-2025-41012

Immediate Actions Required

  • Restrict network access to /WS/PDAWebService.asmx to trusted IP addresses only using firewall rules
  • Implement rate limiting on the affected endpoint to throttle potential enumeration attempts
  • Enable enhanced logging for the PDAWebService to capture all access attempts
  • Review access logs for evidence of prior exploitation or reconnaissance activity
  • Apply vendor patches or updates as soon as they become available from TCMAN

Patch Information

Organizations should consult the security advisory from INCIBE-CERT for detailed remediation guidance: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-2

Contact TCMAN directly for information about security patches addressing CVE-2025-41012. Until an official patch is available, implement the workarounds and compensating controls described below to reduce exposure risk.

Workarounds

If patching is not immediately possible, implement network-level restrictions to limit access to the vulnerable web service endpoint. Configure your web server or reverse proxy to require authentication before allowing access to /WS/PDAWebService.asmx. Consider disabling the UnlockUser SOAP action if it is not required for business operations.

bash
# Example: Block external access to vulnerable endpoint using iptables
# Allow only internal network (adjust subnet as needed)
iptables -A INPUT -p tcp --dport 80 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechTcman Gim

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-862
  • Technical References
  • Third Party Advisory
  • Related CVEs
  • CVE-2025-40664: Tcman Gim Auth Bypass Vulnerability

  • CVE-2025-41015: Tcman Gim Information Disclosure Flaw

  • CVE-2025-41014: Tcman Gim Information Disclosure Flaw

  • CVE-2025-41013: Tcman Gim SQL Injection Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English