Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11943: Use of Default Credentials in 70mai X200

0
Medium
VulnerabilityCVE-2025-11943cvecve-2025-11943
Published: Sun Oct 19 2025 (10/19/2025, 19:32:05 UTC)
Source: CVE Database V5
Vendor/Project: 70mai
Product: X200

Description

A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/27/2025, 01:21:36 UTC

Technical Analysis

CVE-2025-11943 is a vulnerability identified in the 70mai X200 device, specifically within an unspecified functionality of its embedded HTTP Web Server component. The vulnerability arises from the use of default credentials that are not changed or disabled, allowing remote attackers to access the device without authentication or user interaction. The CVSS 4.0 score of 6.9 reflects a medium severity, with attack vector being network-based (AV:N), no privileges or user interaction required (PR:N, UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability affects version 20251010 and earlier. The vendor was notified but has not issued any response or patch, and while no known exploits are currently active in the wild, the public disclosure of exploit details increases the risk of exploitation. The lack of authentication and the remote attack vector make this vulnerability particularly concerning for devices exposed to untrusted networks. The HTTP Web Server component likely provides management or data access interfaces, which if compromised, could allow attackers to manipulate device settings, intercept or alter data, or disrupt device functionality. The absence of patches necessitates alternative mitigation strategies.

Potential Impact

For European organizations, the impact of this vulnerability depends on the deployment context of the 70mai X200 devices. These devices are often used in automotive or security monitoring contexts. Unauthorized remote access could lead to exposure of sensitive data, manipulation of device settings, or denial of service, potentially disrupting operations or compromising safety. Confidentiality is partially impacted as attackers could access data or device interfaces. Integrity could be compromised if attackers alter device configurations or data streams. Availability may be affected if attackers disrupt device operations. The medium severity indicates a significant but not critical risk; however, the lack of vendor response and patches increases the threat over time. Organizations relying on these devices for critical monitoring or security functions face increased operational risks. Additionally, the public disclosure of exploit details raises the likelihood of opportunistic attacks, especially in environments with poor network segmentation or weak perimeter defenses.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement compensating controls. First, isolate 70mai X200 devices on dedicated network segments with strict access controls to limit exposure to untrusted networks. Employ network-level firewalls or access control lists to restrict inbound connections to the device's HTTP Web Server port only to trusted management hosts. Change default credentials if possible; if the device does not allow this, consider disabling the HTTP Web Server or restricting its access. Monitor network traffic for unusual access patterns or attempts to connect to the device's management interface. Employ intrusion detection or prevention systems to detect exploitation attempts. Regularly audit device configurations and logs to identify unauthorized access. Where feasible, replace vulnerable devices with alternatives that receive timely security updates. Engage with the vendor or suppliers to demand security patches or mitigation guidance. Finally, maintain up-to-date asset inventories to quickly identify affected devices in the network.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-19T02:39:10.333Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f540b8b572bcaa2b43c10d

Added to database: 10/19/2025, 7:49:12 PM

Last enriched: 10/27/2025, 1:21:36 AM

Last updated: 12/2/2025, 7:29:23 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats