https://access.redhat.com/security/updates/classification/#important
http://www.nessus.org/u?451267bf
https://access.redhat.com/articles/7131053
https://bugzilla.redhat.com/show_bug.cgi?id=2387221
https://bugzilla.redhat.com/show_bug.cgi?id=2388252
https://bugzilla.redhat.com/show_bug.cgi?id=2392996
https://issues.redhat.com/browse/JBEAP-30702
https://issues.redhat.com/browse/JBEAP-30733
https://issues.redhat.com/browse/JBEAP-30757
https://issues.redhat.com/browse/JBEAP-30758
https://issues.redhat.com/browse/JBEAP-30760
https://issues.redhat.com/browse/JBEAP-30762
https://issues.redhat.com/browse/JBEAP-30886
https://issues.redhat.com/browse/JBEAP-30888
https://issues.redhat.com/browse/JBEAP-30890
https://issues.redhat.com/browse/JBEAP-30917
Severity: High
ID: 266416
File Name: redhat-RHSA-2025-17317.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 10/2/2025
Updated: 10/2/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 5.9
Vendor Severity: Important
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.1
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N
CVSS Score Source: CVE-2025-58056
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Risk Factor: High
Base Score: 8.2
Threat Score: 6.9
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score Source: CVE-2025-55163
CPE: p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-modules, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-rt, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-services, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-tools, p-cpe:/a:redhat:enterprise_linux:eap8-netty, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec-dns, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec-http, p-cpe:/a:redhat:enterprise_linux:eap8-netty-common, p-cpe:/a:redhat:enterprise_linux:eap8-netty-handler, p-cpe:/a:redhat:enterprise_linux:eap8-netty-handler-proxy, p-cpe:/a:redhat:enterprise_linux:eap8-netty-resolver-dns, p-cpe:/a:redhat:enterprise_linux:eap8-netty-transport, p-cpe:/a:redhat:enterprise_linux:eap8-wss4j-ws-security-common, p-cpe:/a:redhat:enterprise_linux:eap8-wss4j-ws-security-policy-stax, p-cpe:/a:redhat:enterprise_linux:eap8-wss4j-ws-security-stax, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-xjc-utils, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-bug986, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-dv, p-cpe:/a:redhat:enterprise_linux:eap8-eap-product-conf-parent, p-cpe:/a:redhat:enterprise_linux:eap8-eap-product-conf-wildfly-ee-feature-pack, p-cpe:/a:redhat:enterprise_linux:eap8-jbossws-cxf, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-core, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-profile-api, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-saml-api, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-security-impl, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-soap-api, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-xacml-impl, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-xacml-saml-impl, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-java-jdk21, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-java-jdk11, p-cpe:/a:redhat:enterprise_linux:eap8-wildfly-java-jdk17, p-cpe:/a:redhat:enterprise_linux:eap8-netty-buffer, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec-socks, p-cpe:/a:redhat:enterprise_linux:eap8-netty-resolver, p-cpe:/a:redhat:enterprise_linux:eap8-netty-transport-classes-epoll, p-cpe:/a:redhat:enterprise_linux:eap8-netty-transport-native-epoll, p-cpe:/a:redhat:enterprise_linux:eap8-netty-transport-native-unix-common, p-cpe:/a:redhat:enterprise_linux:eap8-wss4j, p-cpe:/a:redhat:enterprise_linux:eap8-wss4j-bindings, p-cpe:/a:redhat:enterprise_linux:eap8-wss4j-policy, p-cpe:/a:redhat:enterprise_linux:eap8-wss4j-ws-security-dom, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-boolean, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-runtime, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-ts, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-saml-impl, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-security-api, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-xacml-api, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-xacml-saml-api, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-xmlsec-api, p-cpe:/a:redhat:enterprise_linux:eap8-opensaml-xmlsec-impl, p-cpe:/a:redhat:enterprise_linux:eap8-xml-security
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/2/2025
Vulnerability Publication Date: 8/8/2025
CVE: CVE-2025-48913, CVE-2025-55163, CVE-2025-58056
RHSA: 2025:17317