Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25613: n/a

0
High
VulnerabilityCVE-2025-25613cvecve-2025-25613
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless. All versions before 2.2.0D Build 135103 were discovered to transmit cookies for their web based administrative application containing usernames and passwords. These were transmitted in cleartext using simple base64 encoding during every POST request made to the server.

AI-Powered Analysis

AILast updated: 11/27/2025, 22:11:26 UTC

Technical Analysis

CVE-2025-25613 is a vulnerability identified in FS Inc's S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, specifically affecting all firmware versions prior to 2.2.0D Build 135103. The core issue is that the device’s web-based administrative application transmits authentication cookies containing usernames and passwords in an insecure manner. These cookies are sent in every POST request to the server, encoded only with base64, which is not encryption but a reversible encoding scheme. This means that any attacker with the ability to capture network traffic between an administrator’s browser and the switch can easily decode these cookies to retrieve plaintext credentials. The vulnerability is classified under CWE-312 (Cleartext Storage of Sensitive Information) and has a CVSS v3.1 base score of 7.5, indicating high severity. The vector metrics indicate that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) without affecting integrity or availability. No patches or exploits in the wild are currently reported, but the risk remains significant due to the sensitive nature of the credentials exposed and the critical role of network switches in infrastructure. The vulnerability allows attackers to gain unauthorized administrative access, potentially leading to further network compromise.

Potential Impact

For European organizations, this vulnerability poses a serious risk to network security and confidentiality. If exploited, attackers can obtain administrative credentials for the affected switches, enabling them to manipulate network traffic, create backdoors, or disrupt network operations. This could lead to data breaches, lateral movement within corporate networks, and compromise of sensitive information. Organizations in sectors such as finance, healthcare, telecommunications, and critical infrastructure are particularly vulnerable due to their reliance on secure network management. The exposure of credentials in cleartext also increases the risk of targeted attacks by nation-state actors or cybercriminal groups. Given the lack of required authentication or user interaction, exploitation can be automated and stealthy, increasing the likelihood of unnoticed compromise. The absence of known exploits in the wild does not diminish the potential impact, as the vulnerability is straightforward to exploit with common network sniffing tools.

Mitigation Recommendations

1. Immediately upgrade all FS Inc S3150-8T2F switches to firmware version 2.2.0D Build 135103 or later, where this vulnerability is resolved. 2. If upgrading is not immediately possible, restrict access to the web-based administrative interface to trusted management networks only, using VLAN segmentation and firewall rules. 3. Implement encrypted management protocols such as HTTPS with strong TLS configurations, and disable any insecure management protocols. 4. Use network monitoring and intrusion detection systems to detect unusual access patterns or credential theft attempts. 5. Enforce strong administrative password policies and consider multi-factor authentication if supported. 6. Regularly audit network devices for outdated firmware and insecure configurations. 7. Educate network administrators about the risks of transmitting credentials in cleartext and encourage the use of secure remote management tools. 8. Consider deploying network encryption technologies such as IPsec or MACsec to protect management traffic within the LAN.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f82044f1c50aa2eb5aeea

Added to database: 11/20/2025, 9:03:00 PM

Last enriched: 11/27/2025, 10:11:26 PM

Last updated: 1/8/2026, 9:26:14 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats