Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13053: CWE-311 Missing Encryption of Sensitive Data in ASUSTOR ADM

0
High
VulnerabilityCVE-2025-13053cvecve-2025-13053cwe-311
Published: Fri Dec 12 2025 (12/12/2025, 02:46:08 UTC)
Source: CVE Database V5
Vendor/Project: ASUSTOR
Product: ADM

Description

When a user configures the NAS to retrieve UPS status or control the UPS, a non-enforced TLS certificate verification can allow an attacker able to intercept network traffic between the client and server can perform a man-in-the-middle (MITM) attack, which may obtain the sensitive information of the UPS server configuation. This issue affects ADM: from 4.1.0 through 4.3.3.RKD2, from 5.0.0 through 5.1.0.RN42.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:25:58 UTC

Technical Analysis

CVE-2025-13053 is a vulnerability categorized under CWE-311 (Missing Encryption of Sensitive Data) affecting ASUSTOR ADM NAS devices from versions 4.1.0 through 4.3.3.RKD2 and 5.0.0 through 5.1.0.RN42. The vulnerability occurs when a user configures the NAS to retrieve UPS status or control the UPS, where the TLS certificate verification process is not properly enforced. This improper TLS validation allows an attacker positioned to intercept network traffic between the client and the NAS server to perform a man-in-the-middle (MITM) attack. Through this MITM attack, the adversary can capture sensitive information related to the UPS server configuration, potentially exposing critical operational details. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack traceability (AT:P), no privileges required (PR:N), no user interaction (UI:N), low vulnerability confidentiality impact (VC:L), no integrity or availability impact, and high scope and security requirements. Although no exploits are currently known in the wild, the vulnerability’s presence in widely used NAS devices that manage UPS systems makes it a significant concern. The lack of enforced TLS certificate validation is a fundamental cryptographic flaw that undermines the confidentiality and integrity of sensitive UPS management data transmitted over the network. This could lead to unauthorized disclosure or manipulation of UPS configurations, potentially impacting power management and availability of critical systems relying on these NAS devices.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of UPS management data transmitted between ASUSTOR ADM NAS devices and UPS units. Many enterprises and critical infrastructure operators rely on UPS systems to ensure uninterrupted power supply, and the NAS devices often serve as centralized management points. Exposure of UPS configuration data could allow attackers to understand power management setups, potentially enabling further attacks or disruptions. In sectors such as finance, healthcare, manufacturing, and government, where power continuity is critical, this could lead to operational disruptions or facilitate more complex attack chains. Additionally, the MITM attack vector means that attackers with network access—such as those inside the corporate network or on compromised network segments—can exploit this vulnerability without needing credentials or user interaction. This elevates the risk in environments with insufficient network segmentation or monitoring. The vulnerability’s impact is primarily on confidentiality but could indirectly affect availability if attackers manipulate UPS configurations after gaining sensitive information. Given the high CVSS score and the critical nature of UPS systems, European organizations should treat this vulnerability seriously to avoid potential operational and security consequences.

Mitigation Recommendations

1. Enforce strict TLS certificate validation on all ASUSTOR ADM NAS devices when configuring UPS status retrieval or control to prevent MITM attacks. 2. Network segmentation: Isolate UPS management traffic from general network traffic using VLANs or dedicated management networks to reduce exposure to attackers. 3. Use VPNs or encrypted tunnels for remote UPS management to ensure confidentiality and integrity of data in transit. 4. Monitor network traffic for unusual MITM indicators or unexpected certificate changes related to NAS devices. 5. Apply vendor patches or firmware updates as soon as they become available to address the vulnerability directly. 6. Conduct regular security audits of NAS configurations and UPS integration settings to ensure compliance with best practices. 7. Limit network access to NAS devices to trusted hosts and administrators only, employing strong access controls and network-level filtering. 8. Educate network administrators about the risks of improper TLS validation and the importance of secure UPS management configurations. These steps go beyond generic advice by focusing on network architecture, cryptographic enforcement, and operational security tailored to the specific vulnerability context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ASUSTOR1
Date Reserved
2025-11-12T10:01:38.900Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b86d8650da22753ea479b

Added to database: 12/12/2025, 3:07:04 AM

Last enriched: 12/19/2025, 5:25:58 AM

Last updated: 2/6/2026, 11:52:34 PM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats