Open OnDemand is an open-source HPC portal. Prior to versions 3.1.15 and 4.0.7, noVNC interactive applications did not correctly rotate the password when TurboVNC was higher than version 3.1.2. The likelihood of exploitation is low as a user would need to share their link to an active desktop session and the other user would need to be authenticated to the portal. But obtaining the link would allow that user to perform any actions as the original user and access their data. Open OnDemand 3.1.15 and 4.0.7 have patched this vulnerability and correctly rotate passwords for any version of TurboVNC. As a workaround, downgrade TurboVNC to a version lower than 3.1.2.
Metrics
Affected Vendors & Products
References
History
Fri, 12 Sep 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Osc
Osc open Ondemand |
|
Vendors & Products |
Osc
Osc open Ondemand |
Wed, 10 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 09 Sep 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Open OnDemand is an open-source HPC portal. Prior to versions 3.1.15 and 4.0.7, noVNC interactive applications did not correctly rotate the password when TurboVNC was higher than version 3.1.2. The likelihood of exploitation is low as a user would need to share their link to an active desktop session and the other user would need to be authenticated to the portal. But obtaining the link would allow that user to perform any actions as the original user and access their data. Open OnDemand 3.1.15 and 4.0.7 have patched this vulnerability and correctly rotate passwords for any version of TurboVNC. As a workaround, downgrade TurboVNC to a version lower than 3.1.2. | |
Title | Open OnDemand didn't rotate password for VNC batch_connect | |
Weaknesses | CWE-262 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-09T19:43:47.379Z
Updated: 2025-09-10T13:54:22.197Z
Reserved: 2025-09-01T20:03:06.532Z
Link: CVE-2025-58435

Updated: 2025-09-10T13:54:17.485Z

Status : Awaiting Analysis
Published: 2025-09-09T20:15:48.620
Modified: 2025-09-11T17:14:25.240
Link: CVE-2025-58435

No data.