Skip to main content

CVE-2025-41676: CWE-400 Uncontrolled Resource Consumption in MB connect line mbNET.mini

Medium
VulnerabilityCVE-2025-41676cvecve-2025-41676cwe-400
Published: Mon Jul 21 2025 (07/21/2025, 09:30:07 UTC)
Source: CVE Database V5
Vendor/Project: MB connect line
Product: mbNET.mini

Description

A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.

AI-Powered Analysis

AILast updated: 07/21/2025, 10:02:58 UTC

Technical Analysis

CVE-2025-41676 is a vulnerability classified under CWE-400, indicating uncontrolled resource consumption, found in the MB connect line mbNET.mini device. This device is typically used in industrial and critical infrastructure environments for secure remote access and communication. The vulnerability allows a high privileged remote attacker to exhaust critical system resources by sending a series of specially crafted POST requests to the 'send-sms' action endpoint in rapid succession. Because the attacker must have high-level privileges and no user interaction is required, the attack can be automated and executed remotely over the network. The exhaustion of system resources can lead to denial of service (DoS), potentially rendering the device unresponsive or causing it to fail in its operational role. The CVSS v3.1 score is 4.9 (medium severity), reflecting that while the attack vector is network-based and requires low attack complexity, it does require high privileges and does not impact confidentiality or integrity, only availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on configuration or access control measures at this time.

Potential Impact

For European organizations, particularly those operating industrial control systems, manufacturing plants, or critical infrastructure that utilize MB connect line mbNET.mini devices, this vulnerability poses a risk of service disruption. Exhaustion of system resources could cause communication failures, interrupt remote management, and potentially halt automated processes dependent on these devices. This could lead to operational downtime, financial losses, and safety risks if critical systems become inaccessible or unresponsive. Given the device's role in secure remote access, disruption could also delay incident response or maintenance activities. While confidentiality and integrity are not directly impacted, the availability impact could cascade into broader operational challenges, especially in sectors like energy, manufacturing, and transportation where these devices are deployed.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement strict access controls to limit high privileged access to the mbNET.mini devices, ensuring only trusted administrators can send commands to the 'send-sms' endpoint. Network segmentation should be enforced to isolate these devices from less secure network zones and reduce exposure to potential attackers. Rate limiting or traffic filtering on the network perimeter or device itself could help mitigate rapid successive POST requests. Monitoring and alerting on unusual traffic patterns targeting the 'send-sms' action should be established to detect potential exploitation attempts early. Additionally, organizations should engage with MB connect line support for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. Regular security audits of device configurations and privilege assignments are also recommended to minimize risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.308Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687e0c60a83201eaac0b1798

Added to database: 7/21/2025, 9:46:08 AM

Last enriched: 7/21/2025, 10:02:58 AM

Last updated: 8/14/2025, 5:01:28 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats