Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36729: CWE-269 Improper Privilege Management in RACOM M!DGE2

0
High
VulnerabilityCVE-2025-36729cvecve-2025-36729cwe-269
Published: Tue Aug 26 2025 (08/26/2025, 16:26:08 UTC)
Source: CVE Database V5
Vendor/Project: RACOM
Product: M!DGE2

Description

A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid.

AI-Powered Analysis

AILast updated: 09/05/2025, 20:09:31 UTC

Technical Analysis

CVE-2025-36729 is a high-severity vulnerability affecting RACOM's M!DGE2 device, specifically version 4.0. The issue stems from improper privilege management (CWE-269) within the device's web interface. A non-primary administrator user, who possesses administrative rights to the web interface but lacks shell access permissions, can exploit this vulnerability to view the device's configuration, including the master administrator password. Furthermore, this flaw allows the attacker to escalate their privileges by granting themselves shell access with root group ID (gid) privileges. This effectively bypasses intended access controls, enabling full control over the device's operating environment. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U). Although no known exploits are currently reported in the wild, the vulnerability's nature suggests that an insider or compromised admin-level user could leverage it to gain complete control over the device, potentially leading to unauthorized configuration changes, data exfiltration, or disruption of network services relying on the device. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, especially those relying on RACOM M!DGE2 devices for critical communications infrastructure, this vulnerability poses significant risks. The ability for a non-primary admin to escalate privileges and access root-level shell access can lead to full device compromise. This could result in unauthorized disclosure of sensitive configuration data, including master passwords, leading to lateral movement within networks. The integrity of network operations could be compromised by unauthorized configuration changes, potentially disrupting services or enabling persistent backdoors. Availability may also be affected if attackers disable or manipulate device functions. Given that RACOM devices are often used in industrial, utility, and telecommunications sectors, the impact could extend to critical infrastructure, affecting operational continuity and regulatory compliance under frameworks like NIS2. The vulnerability's exploitation could also undermine trust in managed network services and expose organizations to regulatory penalties under GDPR if personal data is compromised.

Mitigation Recommendations

Organizations should immediately audit access controls on RACOM M!DGE2 devices, ensuring that only fully trusted personnel have administrative web interface access. Segmentation of management interfaces from general network access is critical to reduce exposure. Since no patches are currently available, consider implementing compensating controls such as network-level restrictions (firewalls, ACLs) to limit access to the device's web interface to trusted management networks. Regularly monitor device logs for unusual access patterns or privilege escalations. Employ multi-factor authentication for administrative access where supported. Additionally, prepare for rapid deployment of vendor patches once released by establishing a vulnerability management process that prioritizes this device. If feasible, consider temporary replacement or isolation of vulnerable devices in critical environments until remediation is available. Finally, conduct security awareness training for administrators to recognize and report suspicious activities related to device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
tenable
Date Reserved
2025-04-15T21:53:52.386Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ade535ad5a09ad0059d7e9

Added to database: 8/26/2025, 4:47:49 PM

Last enriched: 9/5/2025, 8:09:31 PM

Last updated: 10/10/2025, 5:25:31 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats