fkie_cve-2025-9229
Vulnerability from fkie_nvd
Published
2025-08-20 09:15
Modified
2025-11-05 13:15
Severity ?
Summary
Information disclosure vulnerability in error handling in MiR software prior to version 3.0.0 allows unauthenticated attackers to view detailed error information, such as file paths and other data, via access to verbose error pages.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure vulnerability in error handling in MiR software prior to version 3.0.0 allows unauthenticated attackers to view detailed error information, such as file paths and other data, via access to verbose error pages."
},
{
"lang": "es",
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el manejo de errores en MiR software anterior a la versi\u00f3n 3.0.0 permite a atacantes no autenticados ver informaci\u00f3n detallada del error, como rutas de archivos y otros datos, a trav\u00e9s del acceso a p\u00e1ginas de error detalladas."
}
],
"id": "CVE-2025-9229",
"lastModified": "2025-11-05T13:15:35.407",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"type": "Secondary"
}
]
},
"published": "2025-08-20T09:15:29.180",
"references": [
{
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"url": "https://mobile-industrial-robots.com/security-advisories/information-disclosure"
},
{
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"url": "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/"
}
],
"sourceIdentifier": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-209"
}
],
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…