Skip to main content

CVE-2025-41677: CWE-400 Uncontrolled Resource Consumption in MB connect line mbNET.mini

Medium
VulnerabilityCVE-2025-41677cvecve-2025-41677cwe-400
Published: Mon Jul 21 2025 (07/21/2025, 09:30:28 UTC)
Source: CVE Database V5
Vendor/Project: MB connect line
Product: mbNET.mini

Description

A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-mail action in fast succession.

AI-Powered Analysis

AILast updated: 07/21/2025, 10:02:46 UTC

Technical Analysis

CVE-2025-41677 is a vulnerability identified in the MB connect line mbNET.mini device, categorized under CWE-400, which pertains to uncontrolled resource consumption. This vulnerability allows a high-privileged remote attacker to exhaust critical system resources by sending a series of specially crafted POST requests targeting the 'send-mail' action endpoint in rapid succession. The attack exploits the device's insufficient handling of resource allocation or request throttling, leading to a denial-of-service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability by potentially rendering the device unresponsive or causing service disruptions. The CVSS 3.1 base score is 4.9 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in April 2025 and published in July 2025, indicating recent discovery and disclosure. The affected product, mbNET.mini, is an industrial communication device used for secure remote access and data transmission in industrial environments, often deployed in critical infrastructure and manufacturing sectors.

Potential Impact

For European organizations, particularly those in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant availability risk. Exploitation could lead to denial-of-service conditions on mbNET.mini devices, disrupting remote access and monitoring capabilities essential for operational continuity. Such disruptions could delay incident response, impair system management, and potentially cause cascading failures in industrial control systems. The requirement for high privileges to exploit the vulnerability limits the attack surface to insiders or attackers who have already compromised credentials or systems with elevated access. However, given the critical role of mbNET.mini devices in secure communications, any downtime can have operational and safety implications. The absence of confidentiality or integrity impact reduces risks related to data breaches or manipulation but does not diminish the operational risks associated with availability loss. European organizations relying on these devices should consider the potential for targeted attacks aiming to disrupt industrial operations or cause service outages.

Mitigation Recommendations

Organizations should implement strict access controls and network segmentation to limit access to mbNET.mini management interfaces, ensuring only authorized high-privileged users can reach the 'send-mail' action endpoint. Monitoring and rate-limiting incoming POST requests to this endpoint can help detect and prevent rapid successive requests indicative of an attack. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tailored to detect abnormal request patterns targeting mbNET.mini devices is recommended. Since no patches are currently available, organizations should engage with the vendor for updates or workarounds and consider temporary compensating controls such as disabling or restricting the send-mail functionality if feasible. Regular auditing of user privileges and credentials is critical to minimize the risk of privilege escalation or misuse. Additionally, maintaining robust incident response plans that include scenarios for device unavailability will help mitigate operational impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.308Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687e0c60a83201eaac0b179b

Added to database: 7/21/2025, 9:46:08 AM

Last enriched: 7/21/2025, 10:02:46 AM

Last updated: 8/3/2025, 12:37:25 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats