Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13221: Unprotected Storage of Credentials in Intelbras UnniTI

0
Medium
VulnerabilityCVE-2025-13221cvecve-2025-13221
Published: Sat Nov 15 2025 (11/15/2025, 19:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Intelbras
Product: UnniTI

Description

A weakness has been identified in Intelbras UnniTI 24.07.11. The affected element is an unknown function of the file /xml/sistema/usuarios.xml. Executing manipulation of the argument Usuario/Senha can lead to unprotected storage of credentials. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:40:14 UTC

Technical Analysis

CVE-2025-13221 identifies a vulnerability in Intelbras UnniTI version 24.07.11 where credentials are stored unprotected in the XML file located at /xml/sistema/usuarios.xml. The vulnerability arises from improper handling of the Usuario/Senha argument, which can be manipulated remotely without authentication or user interaction. This manipulation leads to exposure of stored credentials in cleartext or weakly protected form, enabling attackers to retrieve sensitive login information. The vulnerability is remotely exploitable over the network, with low attack complexity and no privileges required, as indicated by the CVSS vector AV:N/AC:L/PR:N/UI:N. The impact is primarily on confidentiality (VC:L), with no direct integrity or availability effects. Although no active exploitation has been reported, a public exploit is available, increasing the risk of compromise. The affected product, Intelbras UnniTI, is used in various environments for system management, and the exposure of credentials can facilitate unauthorized access, privilege escalation, and further compromise within affected networks. The lack of vendor patches at the time of publication necessitates immediate mitigation through access controls and monitoring. The vulnerability’s medium severity reflects the balance between ease of exploitation and limited scope of impact, but it remains a significant risk due to credential exposure and potential downstream effects.

Potential Impact

For European organizations, the unprotected storage of credentials in Intelbras UnniTI can lead to unauthorized access to critical systems if attackers retrieve and reuse these credentials. This can compromise confidentiality and potentially enable lateral movement within networks, increasing the risk of data breaches and operational disruption. Sectors such as telecommunications, manufacturing, and critical infrastructure that rely on Intelbras products may face heightened risks. Credential exposure can also facilitate supply chain attacks or insider threats if attackers gain persistent access. The remote exploitability without authentication broadens the attack surface, making organizations with externally accessible UnniTI instances particularly vulnerable. Additionally, the availability of a public exploit increases the likelihood of opportunistic attacks. European data protection regulations, including GDPR, impose strict requirements on protecting personal and sensitive data, and exploitation of this vulnerability could lead to regulatory penalties and reputational damage. Organizations may also face increased costs related to incident response, forensic investigations, and remediation.

Mitigation Recommendations

1. Immediately restrict network access to the /xml/sistema/usuarios.xml file and related UnniTI management interfaces using firewall rules, VPNs, or network segmentation to limit exposure to trusted internal networks only. 2. Monitor network traffic and logs for unusual access patterns or attempts to manipulate the Usuario/Senha argument, employing intrusion detection/prevention systems tuned for this vulnerability. 3. Rotate all credentials stored or managed by UnniTI regularly, especially if exposure is suspected or confirmed, to limit the window of compromise. 4. Implement multi-factor authentication (MFA) on systems that integrate with or rely on UnniTI to reduce the impact of credential theft. 5. Engage with Intelbras for timely patch releases and apply security updates as soon as they become available. 6. Conduct a thorough audit of all systems using UnniTI to identify and isolate vulnerable instances. 7. Educate IT and security teams about this vulnerability and the importance of safeguarding credential storage and access controls. 8. Consider deploying endpoint detection and response (EDR) solutions to detect lateral movement attempts post-exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T21:14:33.763Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6918d703cdb3e870ee55d48c

Added to database: 11/15/2025, 7:39:47 PM

Last enriched: 1/7/2026, 7:40:14 PM

Last updated: 2/7/2026, 3:50:31 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats