Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13955: CWE-330 Use of Insufficiently Random Values in EZCast EZCast Pro II

0
Critical
VulnerabilityCVE-2025-13955cvecve-2025-13955cwe-330
Published: Wed Dec 10 2025 (12/10/2025, 08:30:36 UTC)
Source: CVE Database V5
Vendor/Project: EZCast
Product: EZCast Pro II

Description

Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers

AI-Powered Analysis

AILast updated: 12/10/2025, 09:12:45 UTC

Technical Analysis

CVE-2025-13955 identifies a critical security flaw in the EZCast Pro II device, specifically version 1.17478.146, related to the generation of its default Wi-Fi password for the Access Point (AP) functionality. The vulnerability stems from the use of insufficiently random values (CWE-330) to create the default password, which can be predicted by attackers who are within wireless range. The password can be derived by analyzing observable device identifiers, such as MAC addresses or serial numbers, which are often broadcast or easily obtained. This predictability allows an attacker to bypass authentication controls and connect to the device’s AP, gaining unauthorized network access. Once connected, the attacker could potentially intercept network traffic, inject malicious payloads, or pivot to other internal systems depending on network segmentation. The vulnerability does not require any prior authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:A), with low complexity (AC:L), no privileges or user interaction required (PR:N, UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:N). Although no public exploits have been reported yet, the vulnerability’s nature and high severity score (9.3) suggest it is a critical risk that must be addressed promptly. The lack of available patches at the time of disclosure means organizations must rely on interim mitigations. The flaw is particularly concerning for environments where EZCast Pro II devices are used for wireless presentation or streaming, as unauthorized access could lead to data leakage or disruption of business operations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of wireless communications facilitated by EZCast Pro II devices. Unauthorized access to the device’s AP could allow attackers to intercept sensitive presentations, exfiltrate data, or launch further attacks within the internal network. Organizations in sectors such as finance, government, education, and critical infrastructure that rely on wireless presentation devices for meetings and collaboration are especially vulnerable. The potential for disruption of availability also exists if attackers misuse the device to cause denial of service or network interference. Given the ease of exploitation without authentication or user interaction, the threat is amplified in environments with dense device deployments or public-facing meeting rooms. The absence of patches increases the urgency for organizations to implement compensating controls. Failure to address this vulnerability could lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Additionally, the risk of lateral movement within corporate networks following initial compromise could escalate the impact beyond the device itself.

Mitigation Recommendations

Immediate mitigation steps include disabling the Access Point functionality on EZCast Pro II devices until a secure firmware update is released. Organizations should inventory all EZCast Pro II devices to identify those running the vulnerable version 1.17478.146. Network segmentation should be enforced to isolate these devices from sensitive internal networks, limiting potential lateral movement. Monitoring wireless networks for unauthorized connections and unusual traffic patterns can help detect exploitation attempts. If disabling the AP feature is not feasible, consider changing default passwords manually if the device allows, though this may be limited by the vulnerability’s nature. Engage with the vendor to obtain timely patches or firmware updates addressing the randomization flaw. Additionally, implement strict physical security controls to prevent attackers from gaining proximity to the devices. Educate staff about the risks of connecting to unknown wireless networks and encourage reporting of suspicious wireless activity. Finally, incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
NCSC.ch
Date Reserved
2025-12-03T13:26:04.173Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69393610fd479f45ea55244e

Added to database: 12/10/2025, 8:57:52 AM

Last enriched: 12/10/2025, 9:12:45 AM

Last updated: 12/11/2025, 6:41:05 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats