Skip to main content

CVE-2025-48015: CWE-204 Observable Response Discrepancy in Schweitzer Engineering Laboratories SEL-5056 Software-Defined Network Flow Controller

Low
VulnerabilityCVE-2025-48015cvecve-2025-48015cwe-204
Published: Tue May 20 2025 (05/20/2025, 15:11:53 UTC)
Source: CVE
Vendor/Project: Schweitzer Engineering Laboratories
Product: SEL-5056 Software-Defined Network Flow Controller

Description

Failed login response could be different depending on whether the username was local or central.

AI-Powered Analysis

AILast updated: 07/11/2025, 13:17:08 UTC

Technical Analysis

CVE-2025-48015 is a vulnerability identified in the Schweitzer Engineering Laboratories (SEL) SEL-5056 Software-Defined Network Flow Controller. The issue is categorized under CWE-204, which relates to Observable Response Discrepancy. Specifically, the vulnerability arises because the system's failed login responses differ depending on whether the username provided is recognized as a local user or a central user. This discrepancy in response behavior can be exploited by an unauthenticated attacker to enumerate valid usernames by observing the system's distinct error messages or response times. The vulnerability has a CVSS v3.1 base score of 3.7, indicating a low severity level. The vector metrics show that the attack can be performed remotely (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only to a limited extent (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been released yet. The affected product, SEL-5056, is a specialized network flow controller used primarily in industrial and critical infrastructure environments to manage and monitor network traffic flows. The vulnerability does not allow direct compromise of system integrity or availability but could aid attackers in reconnaissance activities by confirming valid usernames, which could be leveraged in subsequent targeted attacks such as brute force or social engineering.

Potential Impact

For European organizations, particularly those operating critical infrastructure sectors such as energy, utilities, and industrial control systems where SEL products are commonly deployed, this vulnerability presents a reconnaissance risk. Attackers could use the observable response discrepancy to enumerate valid usernames, which may facilitate further attacks like credential stuffing or targeted phishing campaigns. While the direct impact on confidentiality, integrity, and availability is low, the information gained could be a stepping stone in a multi-stage attack chain. Given the strategic importance of industrial control systems in Europe’s energy and manufacturing sectors, even low-severity vulnerabilities warrant attention to prevent escalation. The vulnerability’s low CVSS score reflects limited immediate risk but does not diminish its potential role in enabling more severe attacks if combined with other vulnerabilities or social engineering tactics.

Mitigation Recommendations

Organizations should implement network-level controls to restrict access to the SEL-5056 management interfaces, limiting exposure to trusted administrative networks only. Employing strong authentication mechanisms, such as multi-factor authentication (MFA), can reduce the risk of unauthorized access even if usernames are enumerated. Monitoring and alerting on repeated failed login attempts can help detect brute force or enumeration attempts early. Since no patches are currently available, organizations should engage with Schweitzer Engineering Laboratories for updates and apply any forthcoming patches promptly. Additionally, consider implementing uniform error messages for authentication failures at the application or network gateway level to prevent response discrepancies. Regular security assessments and penetration testing focused on authentication mechanisms in critical infrastructure devices are recommended to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEL
Date Reserved
2025-05-15T00:31:11.897Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaef9

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:17:08 PM

Last updated: 8/16/2025, 4:02:02 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats