CVE-2025-48045: CWE-201 Insertion of Sensitive Information Into Sent Data in MICI Network Co. Ltd. NetFax Server
An unauthenticated HTTP GET request to the /client.php endpoint will disclose the default administrator user credentials.
AI Analysis
Technical Summary
CVE-2025-48045 is a high-severity vulnerability affecting MICI Network Co. Ltd.'s NetFax Server product. The vulnerability is categorized under CWE-201, which involves the insertion of sensitive information into sent data. Specifically, an unauthenticated attacker can send an HTTP GET request to the /client.php endpoint of the NetFax Server and receive a response containing the default administrator user credentials. This flaw allows an attacker to obtain privileged access information without any authentication, effectively bypassing access controls. The vulnerability has a CVSS 4.0 base score of 8.7, indicating a high impact with network attack vector, no required privileges, no user interaction, and complete confidentiality compromise. The vulnerability affects version 0 of the product, which likely refers to an initial or early release. No patches or known exploits in the wild have been reported yet. The core technical issue is that sensitive credentials are embedded in server responses to unauthenticated requests, exposing the system to credential disclosure and subsequent unauthorized access or lateral movement within the network.
Potential Impact
For European organizations using MICI Network Co. Ltd.'s NetFax Server, this vulnerability poses a significant risk. Disclosure of default administrator credentials can lead to full administrative control over the fax server, enabling attackers to intercept, modify, or delete fax communications, which may contain sensitive or regulated information. This can result in breaches of confidentiality and integrity, potentially violating GDPR and other data protection regulations. Moreover, compromised fax servers can serve as pivot points for further network intrusion, increasing the risk of ransomware or espionage attacks. The unauthenticated nature of the exploit means attackers can remotely target vulnerable servers without prior access, increasing the attack surface. Given the critical role fax servers may still play in certain regulated industries such as healthcare, legal, and government sectors in Europe, the impact could be severe, including operational disruption and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /client.php endpoint to trusted internal networks only, using network segmentation and firewall rules. Organizations should disable or change default administrator credentials if possible, even before patches are available. Monitoring and logging HTTP requests to detect suspicious access patterns targeting /client.php can help identify exploitation attempts. Since no patches are currently available, organizations should consider isolating or decommissioning vulnerable NetFax Server instances until a vendor fix is released. Employing web application firewalls (WAFs) with custom rules to block unauthenticated requests to sensitive endpoints can provide an additional layer of defense. Finally, organizations should engage with MICI Network Co. Ltd. for timely updates and patches and plan for rapid deployment once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-48045: CWE-201 Insertion of Sensitive Information Into Sent Data in MICI Network Co. Ltd. NetFax Server
Description
An unauthenticated HTTP GET request to the /client.php endpoint will disclose the default administrator user credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-48045 is a high-severity vulnerability affecting MICI Network Co. Ltd.'s NetFax Server product. The vulnerability is categorized under CWE-201, which involves the insertion of sensitive information into sent data. Specifically, an unauthenticated attacker can send an HTTP GET request to the /client.php endpoint of the NetFax Server and receive a response containing the default administrator user credentials. This flaw allows an attacker to obtain privileged access information without any authentication, effectively bypassing access controls. The vulnerability has a CVSS 4.0 base score of 8.7, indicating a high impact with network attack vector, no required privileges, no user interaction, and complete confidentiality compromise. The vulnerability affects version 0 of the product, which likely refers to an initial or early release. No patches or known exploits in the wild have been reported yet. The core technical issue is that sensitive credentials are embedded in server responses to unauthenticated requests, exposing the system to credential disclosure and subsequent unauthorized access or lateral movement within the network.
Potential Impact
For European organizations using MICI Network Co. Ltd.'s NetFax Server, this vulnerability poses a significant risk. Disclosure of default administrator credentials can lead to full administrative control over the fax server, enabling attackers to intercept, modify, or delete fax communications, which may contain sensitive or regulated information. This can result in breaches of confidentiality and integrity, potentially violating GDPR and other data protection regulations. Moreover, compromised fax servers can serve as pivot points for further network intrusion, increasing the risk of ransomware or espionage attacks. The unauthenticated nature of the exploit means attackers can remotely target vulnerable servers without prior access, increasing the attack surface. Given the critical role fax servers may still play in certain regulated industries such as healthcare, legal, and government sectors in Europe, the impact could be severe, including operational disruption and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the /client.php endpoint to trusted internal networks only, using network segmentation and firewall rules. Organizations should disable or change default administrator credentials if possible, even before patches are available. Monitoring and logging HTTP requests to detect suspicious access patterns targeting /client.php can help identify exploitation attempts. Since no patches are currently available, organizations should consider isolating or decommissioning vulnerable NetFax Server instances until a vendor fix is released. Employing web application firewalls (WAFs) with custom rules to block unauthenticated requests to sensitive endpoints can provide an additional layer of defense. Finally, organizations should engage with MICI Network Co. Ltd. for timely updates and patches and plan for rapid deployment once available.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- rapid7
- Date Reserved
- 2025-05-15T13:38:26.770Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68385671182aa0cae27ce98f
Added to database: 5/29/2025, 12:43:29 PM
Last enriched: 7/8/2025, 3:39:36 AM
Last updated: 1/7/2026, 4:53:04 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.