fkie_cve-2025-27615
Vulnerability from fkie_nvd
Published
2025-03-10 19:15
Modified
2025-03-10 19:15
Summary
umatiGateway is software for connecting OPC Unified Architecture servers with an MQTT broker utilizing JSON messages. The user interface may possibly be publicly accessible with umatiGateway's provided docker-compose file. With this access, the configuration can be viewed and altered. Commit 5d81a3412bc0051754a3095d89a06d6d743f2b16 uses `127.0.0.1:8080:8080` to limit access to the local network. For those who are unable to use this proposed patch, a firewall on Port 8080 may block remote access, but the workaround may not be perfect because Docker may also bypass a firewall by its iptable based rules for port forwarding.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "umatiGateway is software for connecting OPC Unified Architecture servers with an MQTT broker utilizing JSON messages. The user interface may possibly be publicly accessible with umatiGateway\u0027s provided docker-compose file. With this access, the configuration can be viewed and altered. Commit 5d81a3412bc0051754a3095d89a06d6d743f2b16 uses `127.0.0.1:8080:8080` to limit access to the local network. For those who are unable to use this proposed patch, a firewall on Port 8080 may block remote access, but the workaround may not be perfect because Docker may also bypass a firewall by its iptable based rules for port forwarding."
    },
    {
      "lang": "es",
      "value": "umatiGateway es un software para conectar servidores de arquitectura unificada OPC con un agente MQTT utilizando mensajes JSON. La interfaz de usuario puede ser de acceso p\u00fablico con el archivo docker-compose proporcionado por umatiGateway. Con este acceso, la configuraci\u00f3n puede verse y modificarse. El commit 5d81a3412bc0051754a3095d89a06d6d743f2b16 utiliza `127.0.0.1:8080:8080` para limitar el acceso a la red local. Para aquellos que no pueden usar este parche propuesto, un firewall en el puerto 8080 puede bloquear el acceso remoto, pero el workaround puede no ser perfecta porque Docker tambi\u00e9n puede eludir un firewall mediante sus reglas basadas en iptable para el reenv\u00edo de puertos."
    }
  ],
  "id": "CVE-2025-27615",
  "lastModified": "2025-03-10T19:15:40.917",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.2,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-10T19:15:40.917",
  "references": [
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/umati/umatiGateway/blob/abe73096a17307327f0d6dc0ed4db1fb93464521/README.md?plain=1#L34-L35"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/umati/umatiGateway/commit/5d81a3412bc0051754a3095d89a06d6d743f2b16"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/umati/umatiGateway/pull/101"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/umati/umatiGateway/security/advisories/GHSA-qf9w-x9qx-2mq7"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…