Skip to main content

CVE-2025-41425: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in DuraComm Corporation SPM-500 DP-10iN-100-MU

High
VulnerabilityCVE-2025-41425cvecve-2025-41425cwe-79
Published: Tue Jul 22 2025 (07/22/2025, 21:38:45 UTC)
Source: CVE Database V5
Vendor/Project: DuraComm Corporation
Product: SPM-500 DP-10iN-100-MU

Description

DuraComm SPM-500 DP-10iN-100-MU is vulnerable to a cross-site scripting attack. This could allow an attacker to prevent legitimate users from accessing the web interface.

AI-Powered Analysis

AILast updated: 07/30/2025, 01:31:32 UTC

Technical Analysis

CVE-2025-41425 is a high-severity vulnerability identified in the DuraComm Corporation's SPM-500 DP-10iN-100-MU device, categorized under CWE-79, which pertains to improper neutralization of input during web page generation, commonly known as Cross-site Scripting (XSS). This vulnerability allows an attacker to inject malicious scripts into the web interface of the device. Because the device's web interface does not properly sanitize user input, an attacker can craft input that executes arbitrary scripts in the context of the victim's browser session. The CVSS 4.0 base score of 7.2 indicates a high severity, with the vector showing that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), no authentication (AT:N), and no user interaction (UI:N). However, it requires low privileges (PR:L), which suggests that the attacker must have some level of access, possibly a low-level user account, to exploit the vulnerability. The impact is significant on integrity and availability (VI:H, VA:H), meaning the attacker can disrupt the normal operation of the web interface, potentially preventing legitimate users from accessing it. The vulnerability does not affect confidentiality (VC:N), indicating that data leakage is not the primary concern. No known exploits are currently in the wild, and no patches have been linked yet, which means organizations using this product should be proactive in monitoring for updates and applying mitigations. The device in question is likely used in industrial or specialized network environments, given the vendor and product naming conventions, which may increase the risk if deployed in critical infrastructure or industrial control systems.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially if the SPM-500 DP-10iN-100-MU devices are deployed in critical infrastructure sectors such as manufacturing, energy, or telecommunications. The ability of an attacker to execute XSS attacks without user interaction and with low privileges could lead to denial of service on the device's management interface, disrupting operational continuity. This disruption could cascade into broader operational impacts if the device controls or monitors critical processes. Although confidentiality is not directly impacted, the loss of integrity and availability could result in operational delays, increased downtime, and potential safety risks. Additionally, the lack of authentication requirement for exploitation lowers the barrier for attackers, increasing the likelihood of exploitation in environments where the device is accessible over the network. European organizations with regulatory requirements around operational resilience and cybersecurity (e.g., NIS Directive, GDPR for related operational impacts) may face compliance risks if this vulnerability is exploited.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement several specific mitigations: 1) Restrict network access to the device's web interface using network segmentation and firewall rules to limit exposure only to trusted administrative hosts. 2) Employ web application firewalls (WAFs) that can detect and block common XSS attack patterns targeting the device's interface. 3) Enforce strict access controls and monitor for unusual login attempts or activities that could indicate exploitation attempts. 4) Implement multi-factor authentication (MFA) for all users with access to the device to reduce the risk posed by the low privilege requirement. 5) Regularly audit and sanitize any user-generated content or inputs that interact with the device's web interface, if applicable. 6) Monitor vendor communications closely for patches or updates and plan for rapid deployment once available. 7) Consider temporary alternative management methods if feasible, such as out-of-band management, until the vulnerability is remediated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-07-15T20:19:54.830Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688007d9a915ff00f7fbc68b

Added to database: 7/22/2025, 9:51:21 PM

Last enriched: 7/30/2025, 1:31:32 AM

Last updated: 8/18/2025, 1:22:23 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats