CVE-2025-48461 (GCVE-0-2025-48461)
Vulnerability from cvelistv5
Published
2025-06-24 02:02
Modified
2025-06-25 13:23
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.
References
▼ | URL | Tags | |
---|---|---|---|
5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 | https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Advantech | Advantech Wireless Sensing and Equipment (WISE) |
Version: A2.01 B00 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-48461", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-24T16:45:36.031567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-341", "description": "CWE-341 Predictable from Observable State", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T13:23:33.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Advantech Wireless Sensing and Equipment (WISE)", "vendor": "Advantech", "versions": [ { "status": "affected", "version": "A2.01 B00" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Joel Chang Zhi Kai" } ], "datePublic": "2025-06-24T02:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords." } ], "value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-24T02:33:00.989Z", "orgId": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "shortName": "CSA" }, "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.\n\n\u003cbr\u003e" } ], "value": "This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration." } ], "source": { "discovery": "UNKNOWN" }, "title": "Weak Session Cookie Entropy", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "assignerShortName": "CSA", "cveId": "CVE-2025-48461", "datePublished": "2025-06-24T02:02:08.633Z", "dateReserved": "2025-05-22T09:41:25.401Z", "dateUpdated": "2025-06-25T13:23:33.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-48461\",\"sourceIdentifier\":\"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4\",\"published\":\"2025-06-24T03:15:33.613\",\"lastModified\":\"2025-07-09T15:02:51.153\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.\"},{\"lang\":\"es\",\"value\":\"La explotaci\u00f3n exitosa de la vulnerabilidad podr\u00eda permitir a un atacante no autenticado realizar conjeturas por fuerza bruta y tomar el control de la cuenta, ya que las cookies de sesi\u00f3n son predecibles, lo que potencialmente permite a los atacantes obtener acceso de root, administrador o usuario y restablecer contrase\u00f1as.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.6,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-341\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40764D08-8173-4AF3-BB93-249D12A9D07D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DCE031-021A-47BC-B81C-1B0DCB9EB8F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFD6963-E219-48F1-8BDE-C3D9F6B2091B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DFF800-1684-4038-BB79-C679DCAF4105\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87715BBD-E9A9-404A-B11E-CFCE0E4CA409\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9241107A-6586-475F-AE13-C541F9AE8AE6\"}]}]}],\"references\":[{\"url\":\"https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/\",\"source\":\"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-48461\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-24T16:45:36.031567Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-341\", \"description\": \"CWE-341 Predictable from Observable State\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-24T16:45:41.770Z\"}}], \"cna\": {\"title\": \"Weak Session Cookie Entropy\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Joel Chang Zhi Kai\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Advantech\", \"product\": \"Advantech Wireless Sensing and Equipment (WISE)\", \"versions\": [{\"status\": \"affected\", \"version\": \"A2.01 B00\"}], \"defaultStatus\": \"unknown\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2025-06-24T02:00:00.000Z\", \"references\": [{\"url\": \"https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4\", \"shortName\": \"CSA\", \"dateUpdated\": \"2025-06-24T02:33:00.989Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-48461\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-25T13:23:33.993Z\", \"dateReserved\": \"2025-05-22T09:41:25.401Z\", \"assignerOrgId\": \"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4\", \"datePublished\": \"2025-06-24T02:02:08.633Z\", \"assignerShortName\": \"CSA\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…