Authentication Bypass in Claroty Secure Remote Access
Summary
Hide ▲
Show ▼
Claroty has patched an authentication bypass flaw (CVE-2025-54603) in its Secure Remote Access (SRA) product. The vulnerability, discovered by Limes Security, allowed attackers to create unauthorized users, impersonate existing users, and gain full admin control. The flaw affects the on-premises OpenID Connect (OIDC) feature in Claroty SRA versions 3.3.0 through 4.0.2. The vulnerability stems from an incorrect implementation of the OIDC authentication flow, enabling attackers to bypass authentication mechanisms and potentially circumvent multifactor authentication. Claroty SRA is used by hundreds of organizations to secure critical OT assets across thousands of sites globally. The flaw was discovered during a routine penetration test and was reported to Claroty earlier this year. The vendor has since released a patch to mitigate the risk.
Timeline
-
30.10.2025 22:29 1 articles · 11d ago
Authentication Bypass in Claroty Secure Remote Access
Claroty has patched an authentication bypass flaw (CVE-2025-54603) in its Secure Remote Access (SRA) product. The vulnerability, discovered by Limes Security, allows attackers to create unauthorized users, impersonate existing users, and gain full admin control. The flaw affects the on-premises OpenID Connect (OIDC) feature in Claroty SRA versions 3.3.0 through 4.0.2. The vulnerability was discovered during a routine penetration test and was reported to Claroty earlier this year. The vendor has since released a patch to mitigate the risk.
Show sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
Information Snippets
-
CVE-2025-54603 affects Claroty Secure Remote Access (SRA) versions 3.3.0 through 4.0.2.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
-
The vulnerability allows attackers to create unauthorized users and impersonate existing users.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
-
The flaw can be exploited to gain full admin control over the affected systems.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
-
The vulnerability was discovered by Limes Security during a routine penetration test.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
-
Claroty SRA is used by hundreds of organizations to secure critical OT assets.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
-
The flaw can bypass multifactor authentication if enabled.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
-
The vulnerability is relatively trivial to exploit once the specific fields or values to manipulate during the authentication process are known.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29
-
Disabling OIDC is not sufficient to mitigate the risk; a patch from Claroty is required.
First reported: 30.10.2025 22:291 source, 1 articleShow sources
- Claroty Patches Authentication Bypass Flaw — www.darkreading.com — 30.10.2025 22:29