CVE-2025-27450: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in Endress+Hauser Endress+Hauser MEAC300-FNADE4
The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie.
AI Analysis
Technical Summary
CVE-2025-27450 is a medium severity vulnerability affecting the Endress+Hauser MEAC300-FNADE4 device, identified as CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute. The issue arises because multiple cookies, including the PHPSESSID session cookie, are set without the Secure attribute. This attribute instructs browsers to only send the cookie over encrypted HTTPS connections. Without it, an attacker can trick a user into connecting to the device via an unencrypted HTTP session, causing the browser to transmit the session cookie in cleartext. This exposes the session identifier to interception by network attackers performing man-in-the-middle (MITM) attacks or eavesdropping on unsecured networks. The vulnerability does not require authentication and has a CVSS 3.1 base score of 6.5, reflecting a network attack vector with low complexity and no privileges required, but requiring user interaction (such as clicking a malicious link). The impact is primarily on confidentiality, as session cookies can be stolen, potentially allowing session hijacking or unauthorized access to the device's web interface. However, integrity and availability are not directly affected. No known exploits are currently reported in the wild, and no patches have been published yet. The affected product is an industrial device from Endress+Hauser, likely used in process automation and instrumentation environments.
Potential Impact
For European organizations, particularly those in industrial sectors such as manufacturing, utilities, and process automation, this vulnerability poses a risk of unauthorized access to critical control devices. The MEAC300-FNADE4 is likely deployed in operational technology (OT) environments where confidentiality breaches can lead to exposure of sensitive operational data or unauthorized control commands. An attacker intercepting session cookies could impersonate legitimate users, potentially disrupting monitoring or control functions indirectly. While the vulnerability does not directly enable command injection or denial of service, session hijacking in industrial control systems can have cascading effects on operational integrity and safety. European organizations with remote or web-accessible interfaces to such devices are at higher risk, especially if users access the device over insecure networks or if internal network segmentation is weak. The absence of the Secure cookie attribute also indicates potential gaps in secure development practices, which may reflect broader security posture concerns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize the following actions: 1) Apply vendor patches or firmware updates once available to ensure cookies are set with the Secure attribute, enforcing HTTPS-only transmission. 2) Enforce strict HTTPS usage by disabling HTTP access to the device’s web interface, including redirecting HTTP requests to HTTPS and using HSTS (HTTP Strict Transport Security) headers. 3) Implement network-level controls such as firewall rules and segmentation to restrict access to the MEAC300-FNADE4 device only to trusted hosts and networks, minimizing exposure to untrusted or public networks. 4) Educate users to avoid accessing the device over unsecured or public Wi-Fi networks and to verify HTTPS connections before entering credentials or interacting with the device. 5) Monitor network traffic for signs of session hijacking attempts or unusual access patterns. 6) Consider deploying web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect anomalous HTTP traffic or cookie misuse. 7) Review and enhance overall OT security policies to include secure cookie handling and session management best practices.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Switzerland, Sweden
CVE-2025-27450: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in Endress+Hauser Endress+Hauser MEAC300-FNADE4
Description
The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie.
AI-Powered Analysis
Technical Analysis
CVE-2025-27450 is a medium severity vulnerability affecting the Endress+Hauser MEAC300-FNADE4 device, identified as CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute. The issue arises because multiple cookies, including the PHPSESSID session cookie, are set without the Secure attribute. This attribute instructs browsers to only send the cookie over encrypted HTTPS connections. Without it, an attacker can trick a user into connecting to the device via an unencrypted HTTP session, causing the browser to transmit the session cookie in cleartext. This exposes the session identifier to interception by network attackers performing man-in-the-middle (MITM) attacks or eavesdropping on unsecured networks. The vulnerability does not require authentication and has a CVSS 3.1 base score of 6.5, reflecting a network attack vector with low complexity and no privileges required, but requiring user interaction (such as clicking a malicious link). The impact is primarily on confidentiality, as session cookies can be stolen, potentially allowing session hijacking or unauthorized access to the device's web interface. However, integrity and availability are not directly affected. No known exploits are currently reported in the wild, and no patches have been published yet. The affected product is an industrial device from Endress+Hauser, likely used in process automation and instrumentation environments.
Potential Impact
For European organizations, particularly those in industrial sectors such as manufacturing, utilities, and process automation, this vulnerability poses a risk of unauthorized access to critical control devices. The MEAC300-FNADE4 is likely deployed in operational technology (OT) environments where confidentiality breaches can lead to exposure of sensitive operational data or unauthorized control commands. An attacker intercepting session cookies could impersonate legitimate users, potentially disrupting monitoring or control functions indirectly. While the vulnerability does not directly enable command injection or denial of service, session hijacking in industrial control systems can have cascading effects on operational integrity and safety. European organizations with remote or web-accessible interfaces to such devices are at higher risk, especially if users access the device over insecure networks or if internal network segmentation is weak. The absence of the Secure cookie attribute also indicates potential gaps in secure development practices, which may reflect broader security posture concerns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize the following actions: 1) Apply vendor patches or firmware updates once available to ensure cookies are set with the Secure attribute, enforcing HTTPS-only transmission. 2) Enforce strict HTTPS usage by disabling HTTP access to the device’s web interface, including redirecting HTTP requests to HTTPS and using HSTS (HTTP Strict Transport Security) headers. 3) Implement network-level controls such as firewall rules and segmentation to restrict access to the MEAC300-FNADE4 device only to trusted hosts and networks, minimizing exposure to untrusted or public networks. 4) Educate users to avoid accessing the device over unsecured or public Wi-Fi networks and to verify HTTPS connections before entering credentials or interacting with the device. 5) Monitor network traffic for signs of session hijacking attempts or unusual access patterns. 6) Consider deploying web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect anomalous HTTP traffic or cookie misuse. 7) Review and enhance overall OT security policies to include secure cookie handling and session management best practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SICK AG
- Date Reserved
- 2025-02-26T08:39:58.980Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68666bf36f40f0eb72964d5a
Added to database: 7/3/2025, 11:39:31 AM
Last enriched: 7/3/2025, 11:56:22 AM
Last updated: 7/3/2025, 1:24:35 PM
Views: 3
Related Threats
CVE-2025-49846: CWE-117: Improper Output Neutralization for Logs in wireapp wire-ios
MediumCVE-2025-6074: CWE-321 Use of Hard-coded Cryptographic Key in ABB RMC-100
MediumCVE-2025-6073: CWE-121 Stack-based Buffer Overflow in ABB RMC-100
HighCVE-2025-6072: CWE-121 Stack-based Buffer Overflow in ABB RMC-100
HighCVE-2025-32079: CWE-20 Improper Input Validation in The Wikimedia Foundation Mediawiki - GrowthExperiments
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.