Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34256: CWE-321 Use of Hard-coded Cryptographic Key in Advantech Co., Ltd. WISE-DeviceOn Server

0
Critical
VulnerabilityCVE-2025-34256cvecve-2025-34256cwe-321
Published: Fri Dec 05 2025 (12/05/2025, 17:18:31 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.

AI-Powered Analysis

AILast updated: 12/05/2025, 17:45:24 UTC

Technical Analysis

CVE-2025-34256 is a vulnerability in Advantech Co., Ltd.'s WISE-DeviceOn Server, affecting all versions prior to 5.4. The core issue is the use of a hard-coded cryptographic key (a static HS512 HMAC secret) to sign EIRMMToken JWTs. Because this key is static and embedded in the software, it is identical across all installations, allowing attackers to forge JWT tokens without knowledge of any secret or credentials. The server accepts these forged tokens if they contain a valid email claim, enabling attackers to impersonate any DeviceOn user, including the root super admin account. This grants full administrative privileges on the DeviceOn server, which manages remote devices and agents. With administrative control, attackers can execute arbitrary code on managed agents via DeviceOn’s remote management capabilities, potentially compromising entire industrial or IoT environments. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 score is 10.0, reflecting critical impact on confidentiality, integrity, and availability, with a wide scope and no barriers to exploitation. No public exploits are known yet, but the severity and ease of exploitation make this a high-priority threat. No patches are currently linked, so mitigation relies on network controls and monitoring until an update is released.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors that rely on Advantech WISE-DeviceOn Server, this vulnerability poses a severe risk. Successful exploitation allows attackers to gain full administrative control over the DeviceOn management platform, potentially leading to unauthorized access to sensitive operational data, disruption of device management, and execution of malicious code on managed devices. This could result in operational downtime, safety hazards, intellectual property theft, and cascading failures in industrial control systems. Given the critical nature of these sectors in Europe and the increasing reliance on IoT and remote device management, the impact could extend to national infrastructure and economic stability. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale, increasing the threat level. Organizations may also face regulatory and compliance repercussions if breaches occur due to inadequate security controls.

Mitigation Recommendations

1. Upgrade to Advantech WISE-DeviceOn Server version 5.4 or later as soon as it becomes available, as this version is expected to remove the hard-coded key vulnerability. 2. Until a patch is available, restrict network access to the DeviceOn server by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. 3. Monitor JWT tokens used by the DeviceOn server for anomalies, such as tokens signed with unexpected keys or unusual email claims, using security information and event management (SIEM) tools. 4. Employ intrusion detection/prevention systems (IDS/IPS) to detect and block attempts to exploit this vulnerability by analyzing JWT token traffic. 5. Conduct regular audits of DeviceOn user accounts and access logs to identify suspicious activities or unauthorized access. 6. Implement multi-factor authentication (MFA) for DeviceOn user accounts where possible to add an additional layer of security. 7. Educate operational technology (OT) and IT teams about this vulnerability and ensure incident response plans include scenarios involving DeviceOn compromise. 8. Coordinate with Advantech support and subscribe to their security advisories for timely updates and patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbdfd

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/5/2025, 5:45:24 PM

Last updated: 12/6/2025, 6:00:10 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats