Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14466: CWE-770 Allocation of Resources Without Limits or Throttling in Güralp Systems Fortimus Series

0
Medium
VulnerabilityCVE-2025-14466cvecve-2025-14466cwe-770
Published: Tue Dec 16 2025 (12/16/2025, 21:31:55 UTC)
Source: CVE Database V5
Vendor/Project: Güralp Systems
Product: Fortimus Series

Description

A vulnerability in the web interface of the Güralp Fortimus Series, Minimus Series and Certimus Series allows an unauthenticated attacker with network access to send specially-crafted HTTP requests that can cause the web service process to deliberately restart. Although this mechanism limits the impact of the attack, it results in a brief denial-of-service condition during the restart.

AI-Powered Analysis

AILast updated: 12/16/2025, 22:01:37 UTC

Technical Analysis

CVE-2025-14466 is a vulnerability identified in the web interface of Güralp Systems’ Fortimus, Minimus, and Certimus Series seismic monitoring devices. The root cause is an allocation of resources without proper limits or throttling (CWE-770), which allows an unauthenticated attacker with network access to send specially crafted HTTP requests that trigger the web service process to restart. This restart mechanism, while preventing prolonged exploitation, causes a brief denial-of-service (DoS) condition by temporarily disrupting the device’s web service availability. The vulnerability affects all versions of the affected products and requires no authentication, user interaction, or privileges, making it accessible to any attacker with network connectivity to the device. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to availability. Güralp devices are widely used in seismic monitoring and critical infrastructure monitoring, meaning that disruption could impact data collection and real-time monitoring capabilities. No patches or known exploits are currently available, but the vulnerability’s presence necessitates proactive defensive measures to prevent potential denial-of-service attacks that could impair monitoring operations.

Potential Impact

For European organizations, especially those involved in seismic monitoring, civil protection, and critical infrastructure, this vulnerability poses a risk of temporary service disruption. Güralp devices are integral to earthquake detection and monitoring networks; a denial-of-service event could delay or prevent timely data collection and alerting, potentially impacting emergency response and public safety. Although the DoS is brief, repeated exploitation could degrade system reliability and trustworthiness. Organizations relying on Güralp Fortimus, Minimus, or Certimus Series devices may experience interruptions in monitoring critical geophysical data. This could affect national geological institutes, research centers, and emergency management agencies. Additionally, disruption in these systems could have cascading effects on infrastructure management and disaster preparedness in seismically active European regions.

Mitigation Recommendations

1. Implement network segmentation to isolate Güralp devices from general network traffic, limiting exposure to untrusted networks. 2. Deploy rate limiting and request throttling on network devices or web application firewalls to detect and block abnormal HTTP request patterns targeting Güralp web interfaces. 3. Monitor network traffic for unusual or repeated HTTP requests to the affected devices, enabling early detection of exploitation attempts. 4. Restrict network access to Güralp devices to trusted IP addresses and use VPNs or secure tunnels for remote access. 5. Engage with Güralp Systems for updates or patches and apply them promptly once available. 6. Consider deploying intrusion detection systems (IDS) with signatures tailored to detect exploitation attempts of this vulnerability. 7. Regularly audit and review device configurations and logs to identify potential exploitation or anomalous behavior. 8. Develop incident response plans that include procedures for rapid recovery from device restarts or service interruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-12-10T16:11:02.542Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6941d344b8ff87d8f93c7337

Added to database: 12/16/2025, 9:46:44 PM

Last enriched: 12/16/2025, 10:01:37 PM

Last updated: 12/17/2025, 4:44:35 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats