Skip to main content

CVE-2025-28202: n/a

High
VulnerabilityCVE-2025-28202cvecve-2025-28202
Published: Fri May 09 2025 (05/09/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Incorrect access control in Victure RX1800 EN_V1.0.0_r12_110933 allows attackers to enable SSH and Telnet services without authentication.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:47:27 UTC

Technical Analysis

CVE-2025-28202 is a high-severity vulnerability identified in the Victure RX1800 device running firmware version EN_V1.0.0_r12_110933. The core issue is an incorrect access control mechanism that allows unauthenticated attackers to enable SSH and Telnet services remotely without any authentication. This vulnerability falls under CWE-862 (Improper Authorization), indicating that the system fails to properly restrict access to sensitive functions. By exploiting this flaw, an attacker can activate remote management services that are typically disabled or protected, thereby gaining a foothold for further exploitation. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector requiring adjacent network access but no privileges or user interaction. Enabling SSH and Telnet services without authentication can lead to unauthorized remote access, command execution, and potentially full system compromise. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the critical nature of the affected services. The lack of vendor or product details beyond the device model and firmware version limits the scope of direct vendor mitigation information, but the vulnerability clearly affects devices running the specified firmware version.

Potential Impact

For European organizations, the impact of CVE-2025-28202 can be substantial, especially for those deploying Victure RX1800 devices in network environments. Unauthorized enabling of SSH and Telnet services can lead to unauthorized remote access, data exfiltration, lateral movement within corporate networks, and disruption of critical services. Given the high CVSS score and the ability to compromise confidentiality, integrity, and availability, organizations may face operational downtime, data breaches, and compliance violations under GDPR if personal data is exposed. Industrial, healthcare, and enterprise sectors using these devices for network management or IoT connectivity are particularly at risk. The vulnerability's exploitation could also serve as a stepping stone for advanced persistent threats (APTs) targeting European infrastructure, increasing the threat landscape complexity. The absence of authentication requirements and user interaction lowers the barrier for attackers, making it a viable target for automated scanning and exploitation within adjacent networks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify all Victure RX1800 devices running the affected firmware version EN_V1.0.0_r12_110933 within their networks. Immediate network segmentation should be applied to isolate these devices from critical infrastructure and sensitive data environments. Disable SSH and Telnet services manually if accessible, or restrict access to these services via firewall rules limiting connections to trusted management hosts. Monitor network traffic for unusual activation of SSH or Telnet services on these devices. Since no patches are currently available, organizations should engage with the vendor or device supplier to obtain firmware updates or security advisories. Implement strict access control policies and multi-factor authentication for device management interfaces where possible. Additionally, deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect unauthorized service activation or anomalous remote access attempts. Regularly audit device configurations and logs to identify any unauthorized changes. Finally, consider replacing or upgrading devices if vendor support is lacking or remediation is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6b86

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:47:27 AM

Last updated: 8/4/2025, 1:41:17 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats