Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13955: CWE-330 Use of Insufficiently Random Values in EZCast EZCast Pro II

0
Critical
VulnerabilityCVE-2025-13955cvecve-2025-13955cwe-330
Published: Wed Dec 10 2025 (12/10/2025, 08:30:36 UTC)
Source: CVE Database V5
Vendor/Project: EZCast
Product: EZCast Pro II

Description

Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers

AI-Powered Analysis

AILast updated: 12/17/2025, 09:27:45 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13955 affects EZCast Pro II devices running firmware version 1.17478.146. It involves the use of insufficiently random values (CWE-330) in generating the default Wi-Fi password for the device's Access Point functionality. Specifically, the default password can be predicted by attackers who can observe device identifiers broadcast by the dongle, such as MAC addresses or serial numbers. This predictability allows attackers within Wi-Fi range to calculate the password without any prior authentication or user interaction, gaining unauthorized access to the device. Once connected, attackers may manipulate the device’s network functions, intercept data streams, or pivot to other network resources. The vulnerability is rated critical with a CVSS 4.0 score of 9.3, reflecting its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges. The flaw arises from poor randomization in password generation algorithms, a classic cryptographic weakness. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable in practice. The lack of vendor patches at the time of publication increases the urgency for mitigation. This issue is particularly concerning for environments where EZCast Pro II devices are used for wireless presentations or collaborative meetings, as unauthorized access could lead to data leakage or disruption of services.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of wireless communications facilitated by EZCast Pro II devices. Unauthorized access to the device’s Access Point can allow attackers to intercept sensitive presentation data, inject malicious content, or use the device as a foothold to access internal networks. This is especially critical in sectors such as finance, government, education, and healthcare, where sensitive information is frequently shared during meetings. The availability of collaboration tools could also be disrupted, impacting business continuity. Additionally, the vulnerability could be exploited in public or semi-public environments like conference centers or corporate offices, increasing the attack surface. Given the high CVSS score and ease of exploitation, organizations face a tangible threat that could lead to data breaches, reputational damage, and regulatory non-compliance under GDPR if personal data is exposed. The lack of authentication and user interaction requirements further exacerbate the risk, making it feasible for attackers to operate stealthily within Wi-Fi range.

Mitigation Recommendations

Immediate mitigation steps include disabling the Access Point functionality on EZCast Pro II devices if not strictly necessary, or restricting its use to secure, controlled environments. Network segmentation should be implemented to isolate these devices from critical internal networks, minimizing lateral movement opportunities. Organizations should monitor wireless networks for unauthorized connections and anomalous device behavior, employing wireless intrusion detection systems (WIDS). Since no vendor patches are currently available, organizations must engage with EZCast for updates and apply firmware patches promptly once released. Additionally, consider replacing affected devices with alternatives that use robust randomization for password generation. Educate staff about the risks of connecting to unknown or unsecured wireless access points and enforce policies that limit device usage to trusted networks. Finally, conduct regular security assessments of wireless infrastructure to detect and remediate similar weaknesses proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NCSC.ch
Date Reserved
2025-12-03T13:26:04.173Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69393610fd479f45ea55244e

Added to database: 12/10/2025, 8:57:52 AM

Last enriched: 12/17/2025, 9:27:45 AM

Last updated: 1/27/2026, 1:27:04 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats