CVE-2025-25613: n/a
FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless. All versions before 2.2.0D Build 135103 were discovered to transmit cookies for their web based administrative application containing usernames and passwords. These were transmitted in cleartext using simple base64 encoding during every POST request made to the server.
AI Analysis
Technical Summary
CVE-2025-25613 is a vulnerability identified in FS Inc's S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, specifically affecting all firmware versions prior to 2.2.0D Build 135103. The core issue is that the device’s web-based administrative application transmits authentication cookies containing usernames and passwords in an insecure manner. These cookies are sent in every POST request to the server, encoded only with base64, which is not encryption but a reversible encoding scheme. This means that any attacker with the ability to capture network traffic between an administrator’s browser and the switch can easily decode these cookies to retrieve plaintext credentials. The vulnerability is classified under CWE-312 (Cleartext Storage of Sensitive Information) and has a CVSS v3.1 base score of 7.5, indicating high severity. The vector metrics indicate that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) without affecting integrity or availability. No patches or exploits in the wild are currently reported, but the risk remains significant due to the sensitive nature of the credentials exposed and the critical role of network switches in infrastructure. The vulnerability allows attackers to gain unauthorized administrative access, potentially leading to further network compromise.
Potential Impact
For European organizations, this vulnerability poses a serious risk to network security and confidentiality. If exploited, attackers can obtain administrative credentials for the affected switches, enabling them to manipulate network traffic, create backdoors, or disrupt network operations. This could lead to data breaches, lateral movement within corporate networks, and compromise of sensitive information. Organizations in sectors such as finance, healthcare, telecommunications, and critical infrastructure are particularly vulnerable due to their reliance on secure network management. The exposure of credentials in cleartext also increases the risk of targeted attacks by nation-state actors or cybercriminal groups. Given the lack of required authentication or user interaction, exploitation can be automated and stealthy, increasing the likelihood of unnoticed compromise. The absence of known exploits in the wild does not diminish the potential impact, as the vulnerability is straightforward to exploit with common network sniffing tools.
Mitigation Recommendations
1. Immediately upgrade all FS Inc S3150-8T2F switches to firmware version 2.2.0D Build 135103 or later, where this vulnerability is resolved. 2. If upgrading is not immediately possible, restrict access to the web-based administrative interface to trusted management networks only, using VLAN segmentation and firewall rules. 3. Implement encrypted management protocols such as HTTPS with strong TLS configurations, and disable any insecure management protocols. 4. Use network monitoring and intrusion detection systems to detect unusual access patterns or credential theft attempts. 5. Enforce strong administrative password policies and consider multi-factor authentication if supported. 6. Regularly audit network devices for outdated firmware and insecure configurations. 7. Educate network administrators about the risks of transmitting credentials in cleartext and encourage the use of secure remote management tools. 8. Consider deploying network encryption technologies such as IPsec or MACsec to protect management traffic within the LAN.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-25613: n/a
Description
FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless. All versions before 2.2.0D Build 135103 were discovered to transmit cookies for their web based administrative application containing usernames and passwords. These were transmitted in cleartext using simple base64 encoding during every POST request made to the server.
AI-Powered Analysis
Technical Analysis
CVE-2025-25613 is a vulnerability identified in FS Inc's S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, specifically affecting all firmware versions prior to 2.2.0D Build 135103. The core issue is that the device’s web-based administrative application transmits authentication cookies containing usernames and passwords in an insecure manner. These cookies are sent in every POST request to the server, encoded only with base64, which is not encryption but a reversible encoding scheme. This means that any attacker with the ability to capture network traffic between an administrator’s browser and the switch can easily decode these cookies to retrieve plaintext credentials. The vulnerability is classified under CWE-312 (Cleartext Storage of Sensitive Information) and has a CVSS v3.1 base score of 7.5, indicating high severity. The vector metrics indicate that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) without affecting integrity or availability. No patches or exploits in the wild are currently reported, but the risk remains significant due to the sensitive nature of the credentials exposed and the critical role of network switches in infrastructure. The vulnerability allows attackers to gain unauthorized administrative access, potentially leading to further network compromise.
Potential Impact
For European organizations, this vulnerability poses a serious risk to network security and confidentiality. If exploited, attackers can obtain administrative credentials for the affected switches, enabling them to manipulate network traffic, create backdoors, or disrupt network operations. This could lead to data breaches, lateral movement within corporate networks, and compromise of sensitive information. Organizations in sectors such as finance, healthcare, telecommunications, and critical infrastructure are particularly vulnerable due to their reliance on secure network management. The exposure of credentials in cleartext also increases the risk of targeted attacks by nation-state actors or cybercriminal groups. Given the lack of required authentication or user interaction, exploitation can be automated and stealthy, increasing the likelihood of unnoticed compromise. The absence of known exploits in the wild does not diminish the potential impact, as the vulnerability is straightforward to exploit with common network sniffing tools.
Mitigation Recommendations
1. Immediately upgrade all FS Inc S3150-8T2F switches to firmware version 2.2.0D Build 135103 or later, where this vulnerability is resolved. 2. If upgrading is not immediately possible, restrict access to the web-based administrative interface to trusted management networks only, using VLAN segmentation and firewall rules. 3. Implement encrypted management protocols such as HTTPS with strong TLS configurations, and disable any insecure management protocols. 4. Use network monitoring and intrusion detection systems to detect unusual access patterns or credential theft attempts. 5. Enforce strong administrative password policies and consider multi-factor authentication if supported. 6. Regularly audit network devices for outdated firmware and insecure configurations. 7. Educate network administrators about the risks of transmitting credentials in cleartext and encourage the use of secure remote management tools. 8. Consider deploying network encryption technologies such as IPsec or MACsec to protect management traffic within the LAN.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-02-07T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691f82044f1c50aa2eb5aeea
Added to database: 11/20/2025, 9:03:00 PM
Last enriched: 11/27/2025, 10:11:26 PM
Last updated: 1/8/2026, 9:26:14 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0701: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.