HCL Aftermarket DPC is affected by Spamming Vulnerability which can allow the actor to excessive spamming can consume server bandwidth and processing resources which may lead to Denial of Service.
PUBLISHED5.2CWE-799
HCL Aftermarket DPC is affected by Spamming Vulnerability
Problem type
Affected products
HCL
Aftermarket DPC
version 1.0.0 - AFFECTED
References
support.hcl-software.com
https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-55268Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-55268",
"assignerOrgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"assignerShortName": "HCL",
"dateUpdated": "2026-03-26T15:01:19.996Z",
"dateReserved": "2025-08-12T06:59:56.644Z",
"datePublished": "2026-03-26T13:00:58.637Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"shortName": "HCL",
"dateUpdated": "2026-03-26T13:00:58.637Z"
},
"title": "HCL Aftermarket DPC is affected by Spamming Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "HCL Aftermarket DPC is affected by Spamming Vulnerability which can allow the actor to excessive spamming can consume server bandwidth and processing resources which may lead to Denial of Service.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "HCL Aftermarket DPC is affected by Spamming Vulnerability which can allow the actor to excessive spamming can consume server bandwidth and processing resources which may lead to Denial of Service."
}
]
}
],
"affected": [
{
"vendor": "HCL",
"product": "Aftermarket DPC",
"defaultStatus": "unaffected",
"versions": [
{
"version": "version 1.0.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-799: Improper Control of Interaction",
"cweId": "CWE-799",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-26T15:01:19.996Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}