CVE-2025-46275: CWE-306 Missing Authentication for Critical Function in Planet Technology WGS-804HPT-V2
WGS-80HPT-V2 and WGS-4215-8T2S are missing authentication that could allow an attacker to create an administrator account without knowing any existing credentials.
AI Analysis
Technical Summary
CVE-2025-46275 is a vulnerability identified in Planet Technology's WGS-804HPT-V2 and WGS-4215-8T2S devices, which are network switches commonly used in industrial and enterprise environments. The core issue is a missing authentication mechanism for a critical function, specifically the creation of administrator accounts. This lack of authentication means that an attacker can create a new administrator account without needing any existing credentials or prior access. This vulnerability falls under CWE-306, which refers to missing authentication for critical functions, allowing unauthorized users to perform privileged operations. The absence of authentication controls on such a sensitive function severely undermines the security model of the affected devices. Exploiting this vulnerability would enable an attacker to gain full administrative control over the device, potentially allowing them to manipulate network traffic, disable security features, or pivot to other parts of the network. Although no known exploits are currently reported in the wild, the simplicity of the attack vector—no credentials or user interaction required—makes it a significant risk once discovered by malicious actors. The vulnerability affects all versions of the product (indicated by affectedVersions: ["0"]), suggesting it is a fundamental design flaw rather than a patchable bug. The vulnerability was reserved and published in April 2025, with enrichment from ICS-CERT, indicating its relevance to industrial control systems and critical infrastructure environments. No patches or mitigations have been officially released yet, increasing the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Planet Technology's network switches in critical infrastructure sectors such as manufacturing, energy, transportation, and telecommunications. Unauthorized administrative access could lead to full device compromise, enabling attackers to intercept, modify, or disrupt network communications. This could result in operational downtime, data breaches, or sabotage of industrial processes. The integrity and availability of network infrastructure could be severely affected, with potential cascading effects on dependent systems. Confidentiality is also at risk since attackers could monitor or exfiltrate sensitive data traversing the compromised switches. Given the role of these devices in industrial environments, the threat extends beyond IT networks to operational technology (OT) systems, increasing the risk of physical damage or safety incidents. The medium severity rating reflects the significant impact balanced against the current lack of known exploits and the need for physical or network access to the device. However, the ease of exploitation—no authentication or user interaction required—raises the threat level if attackers gain network access. European organizations with limited network segmentation or exposed management interfaces are particularly vulnerable.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict network access to the management interfaces of affected devices using network segmentation and firewall rules, allowing only trusted administrative hosts to connect. Employ strong access control lists (ACLs) and disable any unnecessary services or remote management protocols on these switches. Monitor network traffic for unusual account creation attempts or administrative activity. Implement strict logging and alerting on device management events to detect potential exploitation attempts early. Where possible, replace or upgrade affected devices with models from vendors that provide robust authentication mechanisms. Additionally, consider deploying network intrusion detection/prevention systems (IDS/IPS) tailored to detect anomalous behavior related to administrative account creation. Conduct regular security audits and penetration tests focusing on device management interfaces. Finally, maintain close communication with Planet Technology for any forthcoming patches or firmware updates addressing this vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Czech Republic
CVE-2025-46275: CWE-306 Missing Authentication for Critical Function in Planet Technology WGS-804HPT-V2
Description
WGS-80HPT-V2 and WGS-4215-8T2S are missing authentication that could allow an attacker to create an administrator account without knowing any existing credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-46275 is a vulnerability identified in Planet Technology's WGS-804HPT-V2 and WGS-4215-8T2S devices, which are network switches commonly used in industrial and enterprise environments. The core issue is a missing authentication mechanism for a critical function, specifically the creation of administrator accounts. This lack of authentication means that an attacker can create a new administrator account without needing any existing credentials or prior access. This vulnerability falls under CWE-306, which refers to missing authentication for critical functions, allowing unauthorized users to perform privileged operations. The absence of authentication controls on such a sensitive function severely undermines the security model of the affected devices. Exploiting this vulnerability would enable an attacker to gain full administrative control over the device, potentially allowing them to manipulate network traffic, disable security features, or pivot to other parts of the network. Although no known exploits are currently reported in the wild, the simplicity of the attack vector—no credentials or user interaction required—makes it a significant risk once discovered by malicious actors. The vulnerability affects all versions of the product (indicated by affectedVersions: ["0"]), suggesting it is a fundamental design flaw rather than a patchable bug. The vulnerability was reserved and published in April 2025, with enrichment from ICS-CERT, indicating its relevance to industrial control systems and critical infrastructure environments. No patches or mitigations have been officially released yet, increasing the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Planet Technology's network switches in critical infrastructure sectors such as manufacturing, energy, transportation, and telecommunications. Unauthorized administrative access could lead to full device compromise, enabling attackers to intercept, modify, or disrupt network communications. This could result in operational downtime, data breaches, or sabotage of industrial processes. The integrity and availability of network infrastructure could be severely affected, with potential cascading effects on dependent systems. Confidentiality is also at risk since attackers could monitor or exfiltrate sensitive data traversing the compromised switches. Given the role of these devices in industrial environments, the threat extends beyond IT networks to operational technology (OT) systems, increasing the risk of physical damage or safety incidents. The medium severity rating reflects the significant impact balanced against the current lack of known exploits and the need for physical or network access to the device. However, the ease of exploitation—no authentication or user interaction required—raises the threat level if attackers gain network access. European organizations with limited network segmentation or exposed management interfaces are particularly vulnerable.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict network access to the management interfaces of affected devices using network segmentation and firewall rules, allowing only trusted administrative hosts to connect. Employ strong access control lists (ACLs) and disable any unnecessary services or remote management protocols on these switches. Monitor network traffic for unusual account creation attempts or administrative activity. Implement strict logging and alerting on device management events to detect potential exploitation attempts early. Where possible, replace or upgrade affected devices with models from vendors that provide robust authentication mechanisms. Additionally, consider deploying network intrusion detection/prevention systems (IDS/IPS) tailored to detect anomalous behavior related to administrative account creation. Conduct regular security audits and penetration tests focusing on device management interfaces. Finally, maintain close communication with Planet Technology for any forthcoming patches or firmware updates addressing this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-04-22T15:31:46.237Z
- Cisa Enriched
- true
Threat ID: 682d983ec4522896dcbf0217
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 1:42:22 PM
Last updated: 7/30/2025, 4:15:00 AM
Views: 12
Related Threats
CVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.