CVE-2025-48046: CWE-260 Password in Configuration File in MICI Network Co. Ltd. NetFax Server
An authenticated user can disclose the cleartext password of a configured SMTP server via an HTTP GET request to the /config.php endpoint.
AI Analysis
Technical Summary
CVE-2025-48046 is a medium-severity vulnerability affecting the NetFax Server product developed by MICI Network Co. Ltd. The vulnerability is classified under CWE-260, which pertains to the storage of passwords in configuration files. Specifically, an authenticated user can exploit this vulnerability by sending an HTTP GET request to the /config.php endpoint of the NetFax Server. This request discloses the cleartext password of the SMTP server configured within the application. The vulnerability requires the attacker to have some level of authentication (privileged or normal user) but does not require user interaction beyond sending the crafted HTTP request. The CVSS 4.0 base score is 5.3, reflecting a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality by exposing sensitive SMTP credentials, which could be leveraged to send unauthorized emails or facilitate further attacks such as phishing or spam campaigns. There is no indication that integrity or availability are directly impacted. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects version 0 of the product, which likely refers to initial or early releases. The disclosure date is May 29, 2025.
Potential Impact
For European organizations using MICI Network Co. Ltd.'s NetFax Server, this vulnerability poses a significant risk to the confidentiality of SMTP credentials. Exposure of these credentials could allow attackers to send fraudulent emails from legitimate organizational domains, potentially leading to phishing attacks, business email compromise (BEC), or reputational damage. Additionally, attackers could leverage the SMTP credentials to pivot within the network or exfiltrate data via email channels. Although the vulnerability requires authentication, insider threats or compromised user accounts could exploit it. Given the reliance of many European enterprises on secure email communications and compliance requirements such as GDPR, unauthorized disclosure of credentials and subsequent misuse could lead to regulatory penalties and loss of customer trust. The lack of patches increases the urgency for organizations to implement compensating controls. The impact is primarily on confidentiality, with indirect effects on organizational trust and compliance posture.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following mitigations: 1) Restrict access to the /config.php endpoint using network segmentation and firewall rules to limit access only to trusted administrators or management networks. 2) Enforce strong authentication and authorization controls to minimize the risk of compromised accounts being used to exploit this vulnerability. 3) Monitor HTTP logs for suspicious GET requests targeting /config.php and alert on any unauthorized access attempts. 4) Rotate SMTP server passwords regularly and use unique, complex credentials to reduce the impact of potential disclosure. 5) Where possible, disable or restrict the use of the SMTP server configuration interface if it is not required for daily operations. 6) Employ application-layer firewalls or web application firewalls (WAFs) to detect and block attempts to access sensitive configuration files. 7) Engage with MICI Network Co. Ltd. for updates on patches or official remediation guidance and plan for prompt deployment once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-48046: CWE-260 Password in Configuration File in MICI Network Co. Ltd. NetFax Server
Description
An authenticated user can disclose the cleartext password of a configured SMTP server via an HTTP GET request to the /config.php endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2025-48046 is a medium-severity vulnerability affecting the NetFax Server product developed by MICI Network Co. Ltd. The vulnerability is classified under CWE-260, which pertains to the storage of passwords in configuration files. Specifically, an authenticated user can exploit this vulnerability by sending an HTTP GET request to the /config.php endpoint of the NetFax Server. This request discloses the cleartext password of the SMTP server configured within the application. The vulnerability requires the attacker to have some level of authentication (privileged or normal user) but does not require user interaction beyond sending the crafted HTTP request. The CVSS 4.0 base score is 5.3, reflecting a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality by exposing sensitive SMTP credentials, which could be leveraged to send unauthorized emails or facilitate further attacks such as phishing or spam campaigns. There is no indication that integrity or availability are directly impacted. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects version 0 of the product, which likely refers to initial or early releases. The disclosure date is May 29, 2025.
Potential Impact
For European organizations using MICI Network Co. Ltd.'s NetFax Server, this vulnerability poses a significant risk to the confidentiality of SMTP credentials. Exposure of these credentials could allow attackers to send fraudulent emails from legitimate organizational domains, potentially leading to phishing attacks, business email compromise (BEC), or reputational damage. Additionally, attackers could leverage the SMTP credentials to pivot within the network or exfiltrate data via email channels. Although the vulnerability requires authentication, insider threats or compromised user accounts could exploit it. Given the reliance of many European enterprises on secure email communications and compliance requirements such as GDPR, unauthorized disclosure of credentials and subsequent misuse could lead to regulatory penalties and loss of customer trust. The lack of patches increases the urgency for organizations to implement compensating controls. The impact is primarily on confidentiality, with indirect effects on organizational trust and compliance posture.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following mitigations: 1) Restrict access to the /config.php endpoint using network segmentation and firewall rules to limit access only to trusted administrators or management networks. 2) Enforce strong authentication and authorization controls to minimize the risk of compromised accounts being used to exploit this vulnerability. 3) Monitor HTTP logs for suspicious GET requests targeting /config.php and alert on any unauthorized access attempts. 4) Rotate SMTP server passwords regularly and use unique, complex credentials to reduce the impact of potential disclosure. 5) Where possible, disable or restrict the use of the SMTP server configuration interface if it is not required for daily operations. 6) Employ application-layer firewalls or web application firewalls (WAFs) to detect and block attempts to access sensitive configuration files. 7) Engage with MICI Network Co. Ltd. for updates on patches or official remediation guidance and plan for prompt deployment once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- rapid7
- Date Reserved
- 2025-05-15T13:38:26.770Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68385a2e182aa0cae27da586
Added to database: 5/29/2025, 12:59:26 PM
Last enriched: 7/8/2025, 3:39:46 AM
Last updated: 8/7/2025, 2:28:45 PM
Views: 14
Related Threats
CVE-2025-8864: CWE-532 Insertion of Sensitive Information into Log File in YugabyteDB Inc YugabyteDB Anywhere
MediumCVE-2025-8851: Stack-based Buffer Overflow in LibTIFF
MediumCVE-2025-8863: CWE-319 Cleartext Transmission of Sensitive Information in YugabyteDB Inc YugabyteDB
HighCVE-2025-8847: Cross Site Scripting in yangzongzhuan RuoYi
MediumCVE-2025-8839: Improper Authorization in jshERP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.