CVE-2025-62345 Overview
CVE-2025-62345 affects HCL BigFix RunBookAI, where a component contains a security weakness in its input handling implementation. The flaw increases the risk of misconfiguration and operational errors by continuing to allow less-secure input text mechanisms. The vulnerability maps to [CWE-522] (Insufficiently Protected Credentials), indicating that credentials or sensitive input may not be adequately safeguarded during processing.
The issue requires high privileges and network access to exploit, limiting its practical attack surface. Confidentiality impact is limited, with no impact to integrity or availability.
Critical Impact
Authenticated users with high privileges can leverage less-secure input handling in HCL BigFix RunBookAI to access limited confidential information, increasing exposure to misconfiguration risks.
Affected Products
- HCL BigFix RunBookAI
Discovery Timeline
- 2026-05-06 - CVE-2025-62345 published to NVD
- 2026-05-06 - Last updated in NVD database
Technical Details for CVE-2025-62345
Vulnerability Analysis
HCL BigFix RunBookAI continues to expose a less-secure input text mechanism within one of its components. This design choice weakens the protection applied to user-supplied input, including credential material handled by the component. Attackers with valid high-privilege accounts can interact with the component over the network and observe limited confidential data.
The weakness does not enable code execution, data modification, or service disruption. The risk centers on information exposure and operational error caused by insecure input handling defaults.
Root Cause
The root cause is the continued availability of a legacy input text option that does not enforce stronger protection mechanisms. Per [CWE-522], credentials or sensitive inputs traversing this path lack sufficient safeguards. Administrators or users selecting this option may inadvertently transmit or store sensitive data with reduced protection.
Attack Vector
Exploitation requires network reachability to the affected component and authenticated access at a high privilege level. No user interaction is required. Once authenticated, an attacker can interact with the input handling component to capture limited confidential information that should otherwise be protected.
The EPSS score is 0.023%, indicating a very low predicted likelihood of exploitation in the near term. No public proof-of-concept or in-the-wild exploitation has been reported.
For technical specifics and remediation steps, refer to the HCL Software Knowledge Base Article.
Detection Methods for CVE-2025-62345
Indicators of Compromise
- Authentication events from high-privilege accounts interacting with HCL BigFix RunBookAI input components outside of routine operational windows.
- Configuration changes that select or retain the less-secure input text option when stronger alternatives are available.
- Unusual access patterns to RunBookAI components by administrative accounts.
Detection Strategies
- Audit RunBookAI configurations to identify components still using the less-secure input text option.
- Correlate privileged authentication events with subsequent access to components handling credential or sensitive input data.
- Review application and infrastructure logs for read access to fields that may contain protected input values.
Monitoring Recommendations
- Enable verbose logging on HCL BigFix RunBookAI for input handling and authentication subsystems.
- Forward logs to a centralized SIEM or data lake to correlate privileged access with sensitive component interactions.
- Establish alerts for configuration drift that re-enables less-secure input options after remediation.
How to Mitigate CVE-2025-62345
Immediate Actions Required
- Apply guidance and updates referenced in the HCL Software Knowledge Base Article for CVE-2025-62345.
- Inventory all HCL BigFix RunBookAI deployments and identify components configured with the less-secure input text option.
- Restrict high-privilege account usage and enforce least privilege for administrative interactions with RunBookAI.
Patch Information
HCL has published remediation guidance through its support portal. Administrators should consult the HCL Software Knowledge Base Article for fixed versions, configuration changes, and step-by-step remediation instructions specific to CVE-2025-62345.
Workarounds
- Disable or avoid the less-secure input text option where the component supports a more secure alternative.
- Limit network access to RunBookAI components to trusted administrative networks only.
- Rotate credentials that may have been entered through the less-secure input path after remediation is applied.
# Configuration example
# Restrict network access to RunBookAI administrative endpoints
# Replace <runbookai_host> and <admin_subnet> with environment-specific values
iptables -A INPUT -p tcp --dport 443 -s <admin_subnet> -d <runbookai_host> -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -d <runbookai_host> -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


