Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11757: CWE-155 Improper Neutralization of Wildcards or Matching Symbols in CloudEdge CloudEdge App

0
High
VulnerabilityCVE-2025-11757cvecve-2025-11757cwe-155
Published: Tue Oct 21 2025 (10/21/2025, 17:24:54 UTC)
Source: CVE Database V5
Vendor/Project: CloudEdge
Product: CloudEdge App

Description

The CloudEdge Cloud does not sanitize the MQTT topic input, which could allow an attacker to leverage the MQTT wildcard to receive all the messages that should be delivered to other users by subscribing to the a MQTT topic. In these messages, the attacker can obtain the credentials and key information to connect to the cameras from peer to peer.

AI-Powered Analysis

AILast updated: 10/21/2025, 17:35:08 UTC

Technical Analysis

CVE-2025-11757 is a vulnerability classified under CWE-155 (Improper Neutralization of Wildcards or Matching Symbols) affecting CloudEdge App version 4.4.2. The issue stems from the CloudEdge Cloud service's failure to sanitize MQTT topic inputs properly. MQTT is a lightweight messaging protocol widely used in IoT environments, where topics define message routing. The vulnerability allows an attacker to exploit MQTT wildcards (such as '#' or '+') to subscribe to a broad range of topics beyond their authorized scope. By doing so, the attacker can intercept messages intended for other users, which include sensitive data such as credentials and cryptographic keys necessary for establishing peer-to-peer connections to CloudEdge cameras. This unauthorized access compromises the confidentiality of video streams and control commands. The vulnerability can be exploited remotely without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality. Although no exploits are currently known in the wild, the potential for abuse is significant given the sensitive nature of the data exposed. The lack of input validation and topic filtering in MQTT subscriptions is the root cause, highlighting a critical design flaw in the CloudEdge Cloud service's message handling. This vulnerability could enable attackers to surveil or manipulate IoT camera feeds, posing privacy and security risks.

Potential Impact

For European organizations, the impact of CVE-2025-11757 is substantial, particularly for those deploying CloudEdge IoT cameras in critical infrastructure, corporate environments, or smart city projects. Unauthorized access to camera credentials and keys can lead to privacy violations, espionage, and unauthorized surveillance. Compromised camera feeds may expose sensitive corporate or personal information, undermining GDPR compliance and data protection mandates. Additionally, attackers could leverage intercepted credentials to pivot within networks or disrupt camera operations, affecting availability indirectly. The vulnerability's remote exploitability without authentication increases the attack surface, especially in organizations with exposed MQTT brokers or insufficient network segmentation. The breach of confidentiality could also damage organizational reputation and lead to regulatory penalties. Given the growing reliance on IoT devices in Europe, this vulnerability poses a risk to both private and public sector entities.

Mitigation Recommendations

To mitigate CVE-2025-11757, organizations should: 1) Monitor CloudEdge vendor communications and apply security patches immediately once released. 2) Implement strict MQTT topic access controls, ensuring clients can only subscribe to authorized topics without wildcard permissions. 3) Employ input validation and sanitization on MQTT topic strings at the broker and application layers to prevent wildcard abuse. 4) Segment IoT networks to isolate camera devices and MQTT brokers from critical enterprise systems, limiting lateral movement. 5) Use MQTT brokers that support authentication and authorization mechanisms to enforce topic-level permissions. 6) Conduct regular security audits and penetration testing focused on IoT messaging protocols. 7) Educate administrators on secure MQTT configuration best practices. 8) Consider deploying network intrusion detection systems (NIDS) tuned to detect anomalous MQTT subscription patterns. These measures go beyond generic advice by focusing on protocol-specific controls and network architecture adjustments tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-10-14T18:46:17.797Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f7c43cdde5d1d51b4c0d29

Added to database: 10/21/2025, 5:34:52 PM

Last enriched: 10/21/2025, 5:35:08 PM

Last updated: 10/22/2025, 3:25:10 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-22167: Path Traversal (Arbitrary Read/Write) in Atlassian Jira Software Data Center

High
VulnerabilityWed Oct 22 2025

CVE-2025-61756: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. in Oracle Corporation Oracle Financial Services Analytical Applications Infrastructure

High
VulnerabilityTue Oct 21 2025

CVE-2025-62641: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

CVE-2025-62592: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

CVE-2025-62591: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats