Skip to main content

CVE-2025-28232: n/a in n/a

Critical
VulnerabilityCVE-2025-28232cvecve-2025-28232n-acwe-284
Published: Fri Apr 18 2025 (04/18/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Incorrect access control in the HOME.php endpoint of JMBroadcast JMB0150 Firmware v1.0 allows attackers to access the Admin panel without authentication.

AI-Powered Analysis

AILast updated: 06/21/2025, 13:52:02 UTC

Technical Analysis

CVE-2025-28232 is a critical security vulnerability identified in the HOME.php endpoint of the JMBroadcast JMB0150 Firmware version 1.0. This vulnerability arises due to incorrect access control mechanisms, specifically allowing unauthenticated attackers to gain access to the Admin panel. The Admin panel typically provides privileged control over device configurations and management functions. The vulnerability is classified under CWE-284, which pertains to improper access control. According to the CVSS v3.1 scoring, this vulnerability has a high severity score of 9.1, indicating it is easily exploitable over the network without requiring any privileges or user interaction. The impact on confidentiality and integrity is high, as unauthorized access to the Admin panel can lead to unauthorized disclosure of sensitive information and unauthorized modification of device settings. However, availability impact is rated as none, suggesting the vulnerability does not directly cause denial of service. No patches or vendor advisories have been published yet, and there are no known exploits in the wild at the time of reporting. The vulnerability was reserved by MITRE on March 11, 2025, and publicly disclosed on April 18, 2025. The lack of vendor and product information beyond the firmware version limits detailed attribution, but the firmware is associated with JMBroadcast devices, which are likely specialized broadcast or communication hardware.

Potential Impact

For European organizations, the exploitation of this vulnerability could have significant consequences, especially for entities relying on JMBroadcast JMB0150 devices within their network infrastructure. Unauthorized access to the Admin panel could lead to compromise of device configurations, enabling attackers to manipulate broadcast or communication settings, potentially disrupting critical communications or leaking sensitive operational data. Sectors such as media companies, public broadcasters, emergency services, and critical infrastructure operators that utilize broadcast hardware could be particularly affected. The high confidentiality and integrity impact means sensitive information could be exposed or altered, undermining trust and operational security. Although availability is not directly impacted, the indirect effects of configuration tampering could cause service degradation or operational failures. Given the ease of exploitation (no authentication or user interaction required), attackers could rapidly compromise vulnerable devices if exposed to the internet or accessible within internal networks. This risk is heightened in environments with insufficient network segmentation or monitoring.

Mitigation Recommendations

Given the absence of official patches or vendor guidance, European organizations should implement immediate compensating controls. First, restrict network access to the JMBroadcast JMB0150 devices by implementing strict firewall rules and network segmentation to limit exposure of the HOME.php endpoint to trusted management networks only. Employ VPNs or secure management channels to access device administration interfaces. Conduct thorough inventory and asset management to identify all devices running the vulnerable firmware version. Monitor network traffic for unusual access patterns to the Admin panel, leveraging intrusion detection systems (IDS) or security information and event management (SIEM) solutions. If possible, disable or restrict access to the HOME.php endpoint until a patch is available. Engage with the device vendor or supplier to obtain firmware updates or official mitigation advice. Additionally, implement strong logging and alerting on administrative access attempts to detect potential exploitation attempts early. Finally, consider deploying web application firewalls (WAFs) or reverse proxies that can enforce additional access control policies on the vulnerable endpoint.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf72fd

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 1:52:02 PM

Last updated: 8/16/2025, 3:55:39 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats