Skip to main content

CVE-2025-5095: CWE-306 in Burk Technology ARC Solo

Critical
VulnerabilityCVE-2025-5095cvecve-2025-5095cwe-306
Published: Fri Aug 08 2025 (08/08/2025, 17:24:32 UTC)
Source: CVE Database V5
Vendor/Project: Burk Technology
Product: ARC Solo

Description

Burk Technology ARC Solo's password change mechanism can be utilized without proper authentication procedures, allowing an attacker to take over the device. A password change request can be sent directly to the device's HTTP endpoint without providing valid credentials. The system does not enforce proper authentication or session validation, allowing the password change to proceed without verifying the request's legitimacy.

AI-Powered Analysis

AILast updated: 08/08/2025, 17:47:48 UTC

Technical Analysis

CVE-2025-5095 is a critical vulnerability identified in Burk Technology's ARC Solo device, specifically related to improper authentication controls in its password change mechanism. The vulnerability stems from the device's HTTP endpoint that handles password change requests without enforcing any authentication or session validation. This means that an attacker can send a crafted HTTP request directly to the device to change the password without needing valid credentials or prior authentication. The underlying weakness is classified under CWE-306 (Missing Authentication for Critical Function), indicating that the device fails to verify the legitimacy of requests for a sensitive operation. Given the CVSS 3.1 base score of 9.8, the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Exploiting this flaw allows an attacker to take full control of the device by changing its password, potentially locking out legitimate users and gaining unauthorized administrative access. The ARC Solo is typically used in critical infrastructure environments such as broadcast and media facilities for remote control and monitoring, making this vulnerability particularly impactful. No patches have been released at the time of publication, and no known exploits are reported in the wild yet, but the ease of exploitation and critical impact make this a high-risk issue that demands immediate attention.

Potential Impact

For European organizations, especially those in broadcasting, media, and critical infrastructure sectors that deploy Burk Technology ARC Solo devices, this vulnerability poses a severe risk. Successful exploitation can lead to complete device takeover, allowing attackers to disrupt operations, manipulate device configurations, or cause denial of service by locking out legitimate users. This can result in significant operational downtime, loss of control over critical systems, and potential cascading effects on dependent services. Confidentiality is also at risk as attackers could intercept or alter sensitive data managed by the device. Given the device's role in operational technology environments, the integrity and availability impacts could affect service continuity and compliance with European regulations on critical infrastructure protection. Additionally, the lack of authentication enforcement could be leveraged in targeted attacks or automated scanning campaigns, increasing the likelihood of exploitation within European networks.

Mitigation Recommendations

Immediate mitigation steps include isolating ARC Solo devices from untrusted networks and restricting access to the device's HTTP management interface using network segmentation and firewall rules. Organizations should implement strict access controls, allowing only trusted management stations to communicate with the device. Monitoring network traffic for unusual password change requests or unauthorized access attempts is critical. Since no official patches are available, consider deploying compensating controls such as VPN access for management traffic and multi-factor authentication at the network perimeter. Regularly audit device configurations and logs for signs of unauthorized changes. Engage with Burk Technology support channels to obtain updates on patch availability and apply them promptly once released. Additionally, organizations should prepare incident response plans specific to ARC Solo compromise scenarios to minimize impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-05-22T17:59:44.733Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689634c3ad5a09ad00058732

Added to database: 8/8/2025, 5:32:51 PM

Last enriched: 8/8/2025, 5:47:48 PM

Last updated: 8/9/2025, 5:49:22 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats