Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10221: CWE-532 Insertion of Sensitive Information into Log File in AxxonSoft AxxonNet ARP Agent C-WerkNet

0
Medium
VulnerabilityCVE-2025-10221cvecve-2025-10221cwe-532
Published: Wed Sep 10 2025 (09/10/2025, 12:31:52 UTC)
Source: CVE Database V5
Vendor/Project: AxxonSoft
Product: AxxonNet ARP Agent C-WerkNet

Description

Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet / C-WerkNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.

AI-Powered Analysis

AILast updated: 10/08/2025, 11:44:40 UTC

Technical Analysis

CVE-2025-10221 is a vulnerability classified under CWE-532, which pertains to the insertion of sensitive information into log files. The affected product is the ARP Agent component of AxxonSoft's Axxon One / AxxonNet / C-WerkNet version 2.0.4 and earlier running on Windows platforms. The vulnerability arises because the software logs serialized JSON data containing plaintext passwords into TRACE-level log files. These log files are accessible to local users with limited privileges, allowing them to read sensitive credentials without needing elevated permissions or user interaction. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by exposing authentication secrets. The CVSS 3.1 base score is 5.5, reflecting a local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No patches or known exploits have been reported at the time of publication. This vulnerability highlights the risk of improper logging practices that can inadvertently expose sensitive information to unauthorized local users.

Potential Impact

For European organizations, this vulnerability poses a confidentiality risk by potentially exposing plaintext credentials stored in log files to local attackers. This could lead to unauthorized access if attackers leverage these credentials to escalate privileges or move laterally within networks. Organizations in sectors such as critical infrastructure, government, transportation, and security—where AxxonSoft products are commonly deployed—may face increased risk. The vulnerability does not directly affect system availability or integrity but could facilitate further attacks if credentials are compromised. Since exploitation requires local access with limited privileges, the threat is more significant in environments where endpoint security is weak or where multiple users share systems. Additionally, compliance with European data protection regulations (e.g., GDPR) may be impacted if sensitive credentials are exposed, potentially leading to legal and reputational consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict access controls on log files, ensuring that only authorized administrators can read TRACE-level logs. Disable or limit TRACE logging in production environments to reduce exposure of sensitive data. Regularly audit and monitor log file permissions and access patterns to detect unauthorized access attempts. Employ endpoint security solutions that restrict local user capabilities and prevent unauthorized file reads. Consider encrypting sensitive configuration files and credentials to reduce the risk of exposure. Coordinate with AxxonSoft for updates or patches addressing this issue, and apply them promptly once available. Additionally, implement network segmentation and least privilege principles to limit the impact of compromised credentials. Educate local users and administrators about the risks of local privilege escalation and sensitive data exposure in logs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AxxonSoft
Date Reserved
2025-09-10T12:31:11.920Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c172f9e55cc6e90da1b4c2

Added to database: 9/10/2025, 12:45:45 PM

Last enriched: 10/8/2025, 11:44:40 AM

Last updated: 10/30/2025, 2:15:27 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats