Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25613: n/a

0
Medium
VulnerabilityCVE-2025-25613cvecve-2025-25613
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless. All versions before 2.2.0D Build 135103 were discovered to transmit cookies for their web based administrative application containing usernames and passwords. These were transmitted in cleartext using simple base64 encoding during every POST request made to the server.

AI-Powered Analysis

AILast updated: 11/20/2025, 21:18:07 UTC

Technical Analysis

The vulnerability identified as CVE-2025-25613 affects the FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, specifically all firmware versions before 2.2.0D Build 135103. The core issue lies in the web-based administrative interface's handling of authentication cookies. These cookies, which contain usernames and passwords, are transmitted during every POST request to the server. Instead of using secure encryption or at least secure transport mechanisms, the credentials are only base64 encoded, which is a reversible encoding scheme and not a form of encryption. This means that anyone with access to the network traffic can easily decode these cookies and retrieve administrative credentials. The vulnerability compromises confidentiality and integrity by exposing sensitive authentication data, potentially allowing attackers to gain unauthorized administrative access to the switch. Such access could lead to network manipulation, interception, or denial of service. No known public exploits have been reported yet, but the vulnerability is critical due to the sensitive nature of the data exposed and the lack of authentication or user interaction barriers for exploitation. The vulnerability affects network devices commonly deployed in enterprise and service provider environments, making it a significant risk for organizations relying on these switches for network management. The lack of a CVSS score requires an assessment based on the impact and exploitability factors.

Potential Impact

For European organizations, this vulnerability poses a serious risk to network security and operational integrity. The exposure of administrative credentials in cleartext allows attackers with network access—such as insiders, compromised devices on the same LAN, or attackers who have gained a foothold in the network—to intercept credentials and take control of network switches. This can lead to unauthorized configuration changes, traffic interception, network segmentation bypass, or complete denial of service. Critical infrastructure operators, financial institutions, and large enterprises that rely on FS Inc switches for their network backbone are particularly vulnerable. The breach of confidentiality and integrity could result in data leaks, disruption of services, and significant financial and reputational damage. Additionally, the lack of encryption in management traffic violates best practices and regulatory requirements such as GDPR, which mandates protection of sensitive data in transit. The threat is amplified in environments where network segmentation is weak or where remote management interfaces are exposed without additional security controls.

Mitigation Recommendations

1. Immediate upgrade of all affected FS Inc S3150-8T2F switches to firmware version 2.2.0D Build 135103 or later, where this vulnerability is addressed. 2. Implement network segmentation to isolate management interfaces from general user traffic, limiting exposure to trusted administrators only. 3. Enforce the use of secure management protocols such as HTTPS with valid certificates, SSH, or VPN tunnels for remote access to network devices. 4. Regularly audit network traffic for unencrypted credentials or suspicious activity using intrusion detection systems (IDS) and network monitoring tools. 5. Apply strict access control policies and multi-factor authentication (MFA) for administrative access where supported. 6. Educate network administrators on the risks of transmitting credentials in cleartext and the importance of secure configuration. 7. Maintain an inventory of network devices and firmware versions to ensure timely patch management and vulnerability remediation. 8. Consider deploying network anomaly detection solutions to identify unusual administrative access patterns that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f82044f1c50aa2eb5aeea

Added to database: 11/20/2025, 9:03:00 PM

Last enriched: 11/20/2025, 9:18:07 PM

Last updated: 11/21/2025, 12:52:17 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats