Skip to main content

CVE-2025-48046: CWE-260 Password in Configuration File in MICI Network Co. Ltd. NetFax Server

Medium
VulnerabilityCVE-2025-48046cvecve-2025-48046cwe-260
Published: Thu May 29 2025 (05/29/2025, 12:33:27 UTC)
Source: CVE Database V5
Vendor/Project: MICI Network Co. Ltd.
Product: NetFax Server

Description

An authenticated user can disclose the cleartext password of a configured SMTP server via an HTTP GET request to the /config.php endpoint.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:39:46 UTC

Technical Analysis

CVE-2025-48046 is a medium-severity vulnerability affecting the NetFax Server product developed by MICI Network Co. Ltd. The vulnerability is classified under CWE-260, which pertains to the storage of passwords in configuration files. Specifically, an authenticated user can exploit this vulnerability by sending an HTTP GET request to the /config.php endpoint of the NetFax Server. This request discloses the cleartext password of the SMTP server configured within the application. The vulnerability requires the attacker to have some level of authentication (privileged or normal user) but does not require user interaction beyond sending the crafted HTTP request. The CVSS 4.0 base score is 5.3, reflecting a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality by exposing sensitive SMTP credentials, which could be leveraged to send unauthorized emails or facilitate further attacks such as phishing or spam campaigns. There is no indication that integrity or availability are directly impacted. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects version 0 of the product, which likely refers to initial or early releases. The disclosure date is May 29, 2025.

Potential Impact

For European organizations using MICI Network Co. Ltd.'s NetFax Server, this vulnerability poses a significant risk to the confidentiality of SMTP credentials. Exposure of these credentials could allow attackers to send fraudulent emails from legitimate organizational domains, potentially leading to phishing attacks, business email compromise (BEC), or reputational damage. Additionally, attackers could leverage the SMTP credentials to pivot within the network or exfiltrate data via email channels. Although the vulnerability requires authentication, insider threats or compromised user accounts could exploit it. Given the reliance of many European enterprises on secure email communications and compliance requirements such as GDPR, unauthorized disclosure of credentials and subsequent misuse could lead to regulatory penalties and loss of customer trust. The lack of patches increases the urgency for organizations to implement compensating controls. The impact is primarily on confidentiality, with indirect effects on organizational trust and compliance posture.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement the following mitigations: 1) Restrict access to the /config.php endpoint using network segmentation and firewall rules to limit access only to trusted administrators or management networks. 2) Enforce strong authentication and authorization controls to minimize the risk of compromised accounts being used to exploit this vulnerability. 3) Monitor HTTP logs for suspicious GET requests targeting /config.php and alert on any unauthorized access attempts. 4) Rotate SMTP server passwords regularly and use unique, complex credentials to reduce the impact of potential disclosure. 5) Where possible, disable or restrict the use of the SMTP server configuration interface if it is not required for daily operations. 6) Employ application-layer firewalls or web application firewalls (WAFs) to detect and block attempts to access sensitive configuration files. 7) Engage with MICI Network Co. Ltd. for updates on patches or official remediation guidance and plan for prompt deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
rapid7
Date Reserved
2025-05-15T13:38:26.770Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68385a2e182aa0cae27da586

Added to database: 5/29/2025, 12:59:26 PM

Last enriched: 7/8/2025, 3:39:46 AM

Last updated: 8/7/2025, 2:28:45 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats