Mender blog

CVE-2025-49603 - Improper access control of device groups in Mender Server

An ethical hacker on our HackerOne private bug bounty program recently discovered and disclosed access control issues with device groups in Mender Server.

We are writing to inform you of recently discovered issues related to the RBAC feature and device groups in the Mender Server. The issues were fixed in Mender Server 3.7.11 and 4.0.1 - earlier versions are affected. If you haven't already upgraded to the latest version, we recommend upgrading to Mender Server version 4.0.1 or later. (Mender Server 3.7.x is no longer supported). We have no indications of these issues being exploited or known outside of the company and the security researcher who reported it; Thank you to Raviraj for discovering and responsibly disclosing these weaknesses.

Description

If you are using the RBAC system and device groups to give different people access to different devices and groups, there were cases where the users would have access to more than intended. Specifically, depending on how it was set up, granting a user (role) access to some specific devices (through specific static device groups), could lead to them having more access than intended, through the API:

  • Read information about other devices / groups they should not have access to.
  • Deploy updates to more devices than the ones in the group(s) they were intended to have access to.
  • Delete dynamic groups they were not granted access to.

These issues have been fixed in the latest, recently released versions of the Mender Server.

Impact

An attacker with access to a compromised user / session, would have access to more devices and actions than necessary and intended. In the worst case, they would gain access to deploying updates and deleting groups where that user should not have those permissions.

There are some factors to consider:

  • To exploit this, an attacker would first have to compromise a user session within the organization.
    • The issues are not exploitable from other tenants, nor unauthenticated requests.
  • The victim user must be one which has access to some devices through device groups, but not all devices / groups.
  • In the recommended setup, where you use cryptographically signed artifacts, an attacker would not have the option of deploying specially crafted malicious updates. The updates need to be in the system already / need to already be signed by the trusted key, so realistically, one could use this to deploy an older update, for example.

Detection

If you have already upgraded to Mender Server 3.7.11, 4.0.1, or later, you do not have to do anything. Additionally, if you are using hosted Mender, we've already patched this vulnerability for you. The Mender Server version can be found in the Mender UI, bottom left corner. (It is also mentioned at the top of your Helm chart, in the appVersion field).

Remediation

If you are on one of the affected versions, we recommend upgrading, following our upgrade instructions in the documentation:

https://docs.mender.io/server-installation/upgrading-from-previous-versions

Mitigation

Aside from upgrading, there are some general best practices which can help mitigate risks like these;

  • Use cryptographically signed artifacts and configure your devices to verify their signatures.
  • Reduce risk of account compromise by using strong authentication (SAML, SSO, and / or 2FA, combined with strong and unique passwords).
  • Principle of least privilege - Limit the number of admins, use Read access or similar roles to grant read-only access to users who do not need more, etc.

Contact

For help with upgrading or additional questions, please contact support at:

support.northern.tech

Recent articles

IoT growth is outpacing readiness – here’s what the data says

IoT growth is outpacing readiness – here’s what the data says

Learn more about the key takeaways from Northern.tech's recent 2025 State of Industrial IoT Device Lifecycle Management report.
Does EU CRA compliance require advanced OTA update capabilities?

Does EU CRA compliance require advanced OTA update capabilities?

Learn about the requirements of the EU CRA. Outlining the importance of robust OTA update capabilities as a cornerstone of CRA compliance.
Sustainable devices, smart innovation: How OTA updates can contribute to cutting costs and carbon

Sustainable devices, smart innovation: How OTA updates can contribute to cutting costs and carbon

Discover how OTA updates help companies like Kuva Systems and Beegy reduce emissions, cut costs, and build smarter, more sustainable IoT systems.
View more articles

Learn why leading companies choose Mender

Discover how Mender empowers both you and your customers with secure and reliable over-the-air updates for IoT devices. Focus on your product, and benefit from specialized OTA expertise and best practices.

 
sales-pipeline_295756365