Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-45583: n/a

0
Critical
VulnerabilityCVE-2025-45583cvecve-2025-45583
Published: Fri Sep 12 2025 (09/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the FTP protocol of Audi UTR 2.0 Universal Traffic Recorder 2.0 allows attackers to authenticate into the service using any combination of username and password.

AI-Powered Analysis

AILast updated: 09/21/2025, 00:41:57 UTC

Technical Analysis

CVE-2025-45583 is a critical vulnerability affecting the FTP protocol implementation in the Audi UTR 2.0 Universal Traffic Recorder 2.0. The core issue is an incorrect access control mechanism that allows attackers to bypass authentication entirely by using any arbitrary combination of username and password. This vulnerability falls under CWE-287, which relates to improper authentication. The vulnerability has a CVSS v3.1 base score of 9.1, indicating a critical severity level. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N describes a network attack vector with low attack complexity, no privileges required, no user interaction, unchanged scope, and high impact on confidentiality and integrity, but no impact on availability. In practical terms, an attacker can remotely connect to the FTP service of the Audi UTR 2.0 device and gain unauthorized access without valid credentials. This access could allow the attacker to read or modify sensitive traffic recording data, potentially compromising the integrity and confidentiality of recorded traffic information. Since the vulnerability affects a traffic recorder device, it may be used in environments such as traffic monitoring, law enforcement, or transportation infrastructure, where data integrity and confidentiality are critical. No patches or mitigations have been published yet, and no known exploits are reported in the wild as of the publication date. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially those involved in traffic management, law enforcement, or smart city infrastructure, this vulnerability poses a significant risk. Unauthorized access to traffic recorder devices could lead to exposure or manipulation of sensitive traffic data, undermining public safety and trust. Attackers could alter recorded data to evade traffic enforcement or disrupt traffic monitoring systems. The confidentiality breach could expose personally identifiable information or vehicle tracking data, violating privacy regulations such as GDPR. Integrity compromise could affect legal evidence or operational decisions based on traffic data. Although availability is not directly impacted, the loss of trust in data accuracy can have operational consequences. Given the critical CVSS score and ease of exploitation (no authentication or user interaction required), attackers could quickly leverage this vulnerability to gain persistent unauthorized access. This could also serve as a foothold for lateral movement within organizational networks if the device is connected to broader infrastructure.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls to restrict access to the vulnerable FTP service. Organizations should implement strict firewall rules to limit FTP access only to trusted management networks or devices. Network segmentation should isolate the Audi UTR 2.0 devices from general user networks and the internet. Monitoring network traffic for unusual FTP connection attempts or unauthorized access patterns is recommended. Since no patches are currently available, organizations should consider disabling the FTP service on these devices if operationally feasible or replacing the device with a more secure alternative. If disabling FTP is not possible, deploying an application-layer firewall or FTP proxy that enforces authentication could help mitigate unauthorized access. Additionally, organizations should review and harden access credentials and audit logs for suspicious activity. Planning for rapid deployment of vendor patches or firmware updates once released is critical. Finally, organizations should conduct a risk assessment to identify all Audi UTR 2.0 devices in their environment and prioritize remediation efforts accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c4811ab0d74f55ea9c84aa

Added to database: 9/12/2025, 8:22:50 PM

Last enriched: 9/21/2025, 12:41:57 AM

Last updated: 10/30/2025, 2:17:32 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats