Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27847: n/a

0
Medium
VulnerabilityCVE-2025-27847cvecve-2025-27847
Published: Thu Aug 14 2025 (08/14/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In ESPEC North America Web Controller 3 before 3.3.8, /api/v4/auth/ users session privileges are not revoked on logout.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:07:58 UTC

Technical Analysis

CVE-2025-27847 is a medium-severity vulnerability affecting ESPEC North America Web Controller version 3 prior to 3.3.8. The vulnerability arises because the system fails to revoke user session privileges upon logout via the /api/v4/auth/ endpoint. This means that even after a user logs out, their session privileges remain active, potentially allowing unauthorized access or privilege escalation if an attacker can reuse or hijack the session token or session context. The vulnerability is classified under CWE-269, which relates to improper privilege management. The CVSS 3.1 base score is 4.3, reflecting a low attack vector (physical or local access), low complexity, no privileges required, no user interaction, and impacts confidentiality, integrity, and availability at a low level. The vulnerability does not require authentication or user interaction to exploit, but the attack vector is physical or local, limiting remote exploitation. No known exploits are reported in the wild, and no patches are currently linked, indicating that remediation may require updating to version 3.3.8 or later once available. The issue could allow an attacker with local access or physical access to the device to maintain or reuse session privileges after logout, potentially leading to unauthorized actions or data exposure within the controller environment.

Potential Impact

For European organizations using ESPEC North America Web Controller devices, this vulnerability could lead to unauthorized access to critical control systems if an attacker gains local or physical access to the device. This is particularly concerning for industrial or manufacturing sectors where such controllers manage operational technology (OT) environments. The persistence of session privileges post-logout could allow attackers to bypass intended session termination controls, leading to potential data leakage, unauthorized command execution, or disruption of operational processes. Although remote exploitation is unlikely, insider threats or attackers with physical proximity could exploit this flaw. The impact on confidentiality, integrity, and availability is low to medium but could be amplified in environments where these controllers interface with critical infrastructure or sensitive production data. European organizations with strict regulatory requirements around data protection and operational security may face compliance risks if this vulnerability is not addressed.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading ESPEC North America Web Controller software to version 3.3.8 or later once the patch is officially released. Until then, organizations should implement strict physical security controls to prevent unauthorized local access to the devices. Session management policies should be reviewed and enhanced to ensure sessions are properly invalidated on logout. Network segmentation can limit access to the controllers to trusted personnel only. Additionally, monitoring and logging of session activities should be increased to detect any anomalous reuse of session privileges. If possible, temporarily disabling remote access or restricting API endpoint access to trusted IP addresses can reduce exposure. Organizations should also conduct regular security audits of their OT environments to identify and remediate similar session management issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 689dfaa3ad5a09ad005bd06a

Added to database: 8/14/2025, 3:02:59 PM

Last enriched: 8/22/2025, 1:07:58 AM

Last updated: 10/7/2025, 1:49:54 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats