CVE-2025-25613: n/a
FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless. All versions before 2.2.0D Build 135103 were discovered to transmit cookies for their web based administrative application containing usernames and passwords. These were transmitted in cleartext using simple base64 encoding during every POST request made to the server.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-25613 affects the FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, specifically all firmware versions before 2.2.0D Build 135103. The core issue lies in the web-based administrative interface's handling of authentication cookies. These cookies, which contain usernames and passwords, are transmitted during every POST request to the server. Instead of using secure encryption or at least secure transport mechanisms, the credentials are only base64 encoded, which is a reversible encoding scheme and not a form of encryption. This means that anyone with access to the network traffic can easily decode these cookies and retrieve administrative credentials. The vulnerability compromises confidentiality and integrity by exposing sensitive authentication data, potentially allowing attackers to gain unauthorized administrative access to the switch. Such access could lead to network manipulation, interception, or denial of service. No known public exploits have been reported yet, but the vulnerability is critical due to the sensitive nature of the data exposed and the lack of authentication or user interaction barriers for exploitation. The vulnerability affects network devices commonly deployed in enterprise and service provider environments, making it a significant risk for organizations relying on these switches for network management. The lack of a CVSS score requires an assessment based on the impact and exploitability factors.
Potential Impact
For European organizations, this vulnerability poses a serious risk to network security and operational integrity. The exposure of administrative credentials in cleartext allows attackers with network access—such as insiders, compromised devices on the same LAN, or attackers who have gained a foothold in the network—to intercept credentials and take control of network switches. This can lead to unauthorized configuration changes, traffic interception, network segmentation bypass, or complete denial of service. Critical infrastructure operators, financial institutions, and large enterprises that rely on FS Inc switches for their network backbone are particularly vulnerable. The breach of confidentiality and integrity could result in data leaks, disruption of services, and significant financial and reputational damage. Additionally, the lack of encryption in management traffic violates best practices and regulatory requirements such as GDPR, which mandates protection of sensitive data in transit. The threat is amplified in environments where network segmentation is weak or where remote management interfaces are exposed without additional security controls.
Mitigation Recommendations
1. Immediate upgrade of all affected FS Inc S3150-8T2F switches to firmware version 2.2.0D Build 135103 or later, where this vulnerability is addressed. 2. Implement network segmentation to isolate management interfaces from general user traffic, limiting exposure to trusted administrators only. 3. Enforce the use of secure management protocols such as HTTPS with valid certificates, SSH, or VPN tunnels for remote access to network devices. 4. Regularly audit network traffic for unencrypted credentials or suspicious activity using intrusion detection systems (IDS) and network monitoring tools. 5. Apply strict access control policies and multi-factor authentication (MFA) for administrative access where supported. 6. Educate network administrators on the risks of transmitting credentials in cleartext and the importance of secure configuration. 7. Maintain an inventory of network devices and firmware versions to ensure timely patch management and vulnerability remediation. 8. Consider deploying network anomaly detection solutions to identify unusual administrative access patterns that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-25613: n/a
Description
FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless. All versions before 2.2.0D Build 135103 were discovered to transmit cookies for their web based administrative application containing usernames and passwords. These were transmitted in cleartext using simple base64 encoding during every POST request made to the server.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-25613 affects the FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, specifically all firmware versions before 2.2.0D Build 135103. The core issue lies in the web-based administrative interface's handling of authentication cookies. These cookies, which contain usernames and passwords, are transmitted during every POST request to the server. Instead of using secure encryption or at least secure transport mechanisms, the credentials are only base64 encoded, which is a reversible encoding scheme and not a form of encryption. This means that anyone with access to the network traffic can easily decode these cookies and retrieve administrative credentials. The vulnerability compromises confidentiality and integrity by exposing sensitive authentication data, potentially allowing attackers to gain unauthorized administrative access to the switch. Such access could lead to network manipulation, interception, or denial of service. No known public exploits have been reported yet, but the vulnerability is critical due to the sensitive nature of the data exposed and the lack of authentication or user interaction barriers for exploitation. The vulnerability affects network devices commonly deployed in enterprise and service provider environments, making it a significant risk for organizations relying on these switches for network management. The lack of a CVSS score requires an assessment based on the impact and exploitability factors.
Potential Impact
For European organizations, this vulnerability poses a serious risk to network security and operational integrity. The exposure of administrative credentials in cleartext allows attackers with network access—such as insiders, compromised devices on the same LAN, or attackers who have gained a foothold in the network—to intercept credentials and take control of network switches. This can lead to unauthorized configuration changes, traffic interception, network segmentation bypass, or complete denial of service. Critical infrastructure operators, financial institutions, and large enterprises that rely on FS Inc switches for their network backbone are particularly vulnerable. The breach of confidentiality and integrity could result in data leaks, disruption of services, and significant financial and reputational damage. Additionally, the lack of encryption in management traffic violates best practices and regulatory requirements such as GDPR, which mandates protection of sensitive data in transit. The threat is amplified in environments where network segmentation is weak or where remote management interfaces are exposed without additional security controls.
Mitigation Recommendations
1. Immediate upgrade of all affected FS Inc S3150-8T2F switches to firmware version 2.2.0D Build 135103 or later, where this vulnerability is addressed. 2. Implement network segmentation to isolate management interfaces from general user traffic, limiting exposure to trusted administrators only. 3. Enforce the use of secure management protocols such as HTTPS with valid certificates, SSH, or VPN tunnels for remote access to network devices. 4. Regularly audit network traffic for unencrypted credentials or suspicious activity using intrusion detection systems (IDS) and network monitoring tools. 5. Apply strict access control policies and multi-factor authentication (MFA) for administrative access where supported. 6. Educate network administrators on the risks of transmitting credentials in cleartext and the importance of secure configuration. 7. Maintain an inventory of network devices and firmware versions to ensure timely patch management and vulnerability remediation. 8. Consider deploying network anomaly detection solutions to identify unusual administrative access patterns that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-02-07T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691f82044f1c50aa2eb5aeea
Added to database: 11/20/2025, 9:03:00 PM
Last enriched: 11/20/2025, 9:18:07 PM
Last updated: 11/21/2025, 12:52:17 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13485: SQL Injection in itsourcecode Online File Management System
MediumCVE-2025-64660: CWE-284: Improper Access Control in Microsoft Visual Studio Code
MediumCVE-2025-64655: CWE-285: Improper Authorization in Microsoft Dynamics OmniChannel SDK Storage Containers
HighCVE-2025-62459: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft 365 Defender Portal
HighCVE-2025-62207: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Azure Monitor Control Service
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.