Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41676: CWE-400 Uncontrolled Resource Consumption in MB connect line mbNET.mini

0
Medium
VulnerabilityCVE-2025-41676cvecve-2025-41676cwe-400
Published: Mon Jul 21 2025 (07/21/2025, 09:30:07 UTC)
Source: CVE Database V5
Vendor/Project: MB connect line
Product: mbNET.mini

Description

A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:50:20 UTC

Technical Analysis

CVE-2025-41676 identifies an uncontrolled resource consumption vulnerability (CWE-400) in the mbNET.mini device by MB connect line. The flaw allows a remote attacker with high privileges to repeatedly send specially crafted POST requests to the device's send-sms action endpoint. This rapid succession of requests causes exhaustion of critical system resources, such as CPU, memory, or network buffers, leading to denial-of-service conditions that impair device availability. The vulnerability does not impact confidentiality or integrity, as it does not allow data leakage or unauthorized modification. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but mandates high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), indicating the impact is limited to the vulnerable component. The CVSS v3.1 base score is 4.9, categorizing it as medium severity. No patches or known exploits are currently available, but the vulnerability was publicly disclosed on July 21, 2025. The mbNET.mini is commonly deployed in industrial and critical infrastructure environments, where reliable device operation is essential. This vulnerability could be exploited by insiders or attackers who have already gained elevated access, potentially disrupting communications or control systems relying on the device's SMS functionality. The lack of authentication bypass or remote code execution limits the attacker's capabilities to denial-of-service only. However, the impact on availability can be significant in operational technology contexts.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a risk of service disruption. The mbNET.mini device is often used for secure remote access and communication in industrial control systems. An attacker exploiting this vulnerability could cause denial-of-service, leading to loss of remote management capabilities or interruption of SMS-based alerting and control functions. This could delay incident response, reduce operational efficiency, or cause safety risks if critical alerts are not transmitted. Although the vulnerability requires high privileges, insider threats or compromised administrative accounts could facilitate exploitation. The absence of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational impact. Organizations relying on mbNET.mini devices should assess their exposure, as prolonged outages could affect production lines, energy distribution, or transportation systems. The medium severity rating indicates that while the threat is not critical, it warrants timely mitigation to maintain system availability and operational continuity.

Mitigation Recommendations

1. Implement strict access control policies to limit administrative privileges to trusted personnel only, reducing the risk of high-privilege attackers. 2. Deploy network segmentation and firewall rules to restrict access to the mbNET.mini management interfaces, especially the send-sms endpoint. 3. Introduce rate limiting or request throttling mechanisms at the network or application level to prevent rapid successive POST requests that could exhaust resources. 4. Monitor device logs and network traffic for unusual patterns of POST requests targeting the send-sms action, enabling early detection of exploitation attempts. 5. Regularly audit user accounts and credentials to detect and remove unauthorized or dormant high-privilege accounts. 6. Engage with MB connect line support or vendor channels to obtain patches or firmware updates once available, and apply them promptly. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect resource exhaustion attacks on industrial devices. 8. Develop and test incident response plans that include recovery procedures for mbNET.mini device outages to minimize downtime. 9. If possible, disable or restrict SMS functionality on devices where it is not essential to reduce the attack surface. 10. Maintain up-to-date asset inventories to identify all mbNET.mini devices and prioritize remediation efforts accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.308Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687e0c60a83201eaac0b1798

Added to database: 7/21/2025, 9:46:08 AM

Last enriched: 11/4/2025, 1:50:20 AM

Last updated: 11/7/2025, 3:34:22 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats