Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13651: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Microcom ZeusWeb

0
Medium
VulnerabilityCVE-2025-13651cvecve-2025-13651cwe-497
Published: Wed Feb 11 2026 (02/11/2026, 09:06:09 UTC)
Source: CVE Database V5
Vendor/Project: Microcom
Product: ZeusWeb

Description

Exposure of Sensitive System Information to an Unauthorized Actor vulnerability in Microcom ZeusWeb allows Web Application Fingerprinting of sensitive data. This issue affects ZeusWeb: 6.1.31.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 09:52:19 UTC

Technical Analysis

CVE-2025-13651 is a vulnerability classified under CWE-497, indicating exposure of sensitive system information to unauthorized actors. It affects Microcom's ZeusWeb product, specifically version 6.1.31. The flaw allows an attacker to perform web application fingerprinting remotely without any authentication or user interaction, thereby exposing sensitive system information that should otherwise be protected. This information leakage can include configuration details, system versioning, or other metadata that could facilitate further targeted attacks. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the vulnerability's network attack vector, low complexity, and no required privileges or user interaction, but limited impact confined to confidentiality. No known exploits have been reported in the wild, suggesting it is either newly disclosed or not yet weaponized. The vulnerability does not affect integrity or availability directly but poses a risk by enabling attackers to gather intelligence about the target system. ZeusWeb is a web application platform used in various industrial and enterprise environments, making this vulnerability relevant for organizations relying on it for critical operations. The absence of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, the exposure of sensitive system information via CVE-2025-13651 can facilitate reconnaissance activities by threat actors, increasing the risk of subsequent targeted attacks such as exploitation of other vulnerabilities or social engineering. Organizations in sectors like industrial control systems, telecommunications, and enterprise IT that deploy Microcom ZeusWeb 6.1.31 could see increased risk of data leakage and potential compromise. Although the vulnerability does not directly disrupt operations or data integrity, the intelligence gained by attackers can lead to more severe breaches. This is particularly critical for organizations handling sensitive or regulated data under GDPR, where unauthorized information disclosure can result in compliance violations and reputational damage. The medium severity rating suggests a moderate but non-negligible risk, warranting timely attention especially in high-value or critical infrastructure environments.

Mitigation Recommendations

1. Restrict network access to the ZeusWeb application by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts only. 2. Monitor web server logs and network traffic for unusual fingerprinting or reconnaissance patterns indicative of exploitation attempts. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting fingerprinting vectors. 4. Engage with Microcom for official patches or updates addressing CVE-2025-13651 and plan prompt deployment once available. 5. Conduct internal security assessments and penetration tests to identify and remediate other potential information disclosure issues. 6. Harden the ZeusWeb configuration by disabling unnecessary information disclosure features or verbose error messages. 7. Implement strict access controls and multi-factor authentication for administrative interfaces to reduce attack surface. 8. Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HackRTU
Date Reserved
2025-11-25T09:45:49.686Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c48e04b57a58fa1864d0c

Added to database: 2/11/2026, 9:16:16 AM

Last enriched: 2/18/2026, 9:52:19 AM

Last updated: 3/28/2026, 5:17:30 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses