This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical SCIM Privilege Escalation in Grafana Enterprise. <br>π₯ **Consequences**: Attackers can impersonate users or escalate privileges to Admin level. CVSS Score: **10.0** (Critical).
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Improper handling of user identity in **SCIM configuration**.β¦
π£ **Public Exp**: **YES**. Multiple PoCs available on GitHub (e.g., `Blackash-CVE-2025-41115`). <br>π₯ **Wild Exploitation**: High risk due to simplicity of sending a numeric `externalId`.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Check if running **Grafana Enterprise 12.x**. <br>2. Verify if **SCIM** is enabled. <br>3. Check config for `user_sync_enabled = true`. <br>4. Scan for SCIM endpoints accepting numeric IDs.
π§ **No Patch Workaround**: <br>1. **Disable SCIM** if not strictly needed. <br>2. Set `user_sync_enabled = false`. <br>3. Restrict SCIM client access via **Firewall/WAF** to trusted IPs only.
Q10Is it urgent? (Priority Suggestion)
π΄ **Urgency**: **CRITICAL / IMMEDIATE**. <br>π’ **Priority**: Patch immediately. CVSS 10.0 + Public Exploits = High likelihood of active attacks. Do not wait.