Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54304: n/a

0
Critical
VulnerabilityCVE-2025-54304cvecve-2025-54304
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on Thermo Fisher Ion Torrent OneTouch 2 INS1005527 devices. When they are powered on, an X11 display server is started. The display server listens on all network interfaces and is accessible over port 6000. The X11 access control list, by default, allows connections from 127.0.0.1 and 192.168.2.15. If a device is powered on and later connected to a network with DHCP, the device may not be assigned the 192.168.2.15 IP address, leaving the display server accessible by other devices on the network. The exposed X11 display server can then be used to gain root privileges and the ability to execute code remotely by interacting with matchbox-desktop and spawning a terminal. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:03:19 UTC

Technical Analysis

The vulnerability CVE-2025-54304 affects Thermo Fisher Ion Torrent OneTouch 2 INS1005527 sequencing devices. Upon powering on, these devices automatically start an X11 display server that listens on port 6000 across all network interfaces. The X11 server's access control list (ACL) is configured by default to allow connections only from 127.0.0.1 (localhost) and the static IP 192.168.2.15. However, when the device is connected to a network using DHCP, it may receive an IP address different from 192.168.2.15, causing the ACL to no longer restrict access properly. Consequently, the X11 server becomes accessible to any device on the local network. An attacker on the same network can connect to this exposed X11 server and interact with the matchbox-desktop environment to spawn a terminal session. This interaction enables the attacker to escalate privileges to root and execute arbitrary code remotely without requiring authentication or user interaction. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS v3.1 score of 9.8, reflecting critical impact on confidentiality, integrity, and availability. Notably, the affected devices are no longer supported by the vendor, and no patches or mitigations have been released. Although no known exploits are currently in the wild, the ease of exploitation and severity make this a significant threat to environments where these devices are deployed.

Potential Impact

For European organizations, the impact of this vulnerability is substantial, especially in research institutions, clinical laboratories, and biotech companies using Thermo Fisher Ion Torrent OneTouch 2 devices. Exploitation could lead to full system compromise, allowing attackers to execute arbitrary code with root privileges. This could result in unauthorized access to sensitive genomic data, manipulation or destruction of sequencing results, disruption of laboratory workflows, and potential exposure of patient or research data. The ability to remotely compromise these devices without authentication or user interaction increases the risk of lateral movement within internal networks. Given that these devices are often connected to internal networks with sensitive data, the vulnerability could serve as a foothold for broader attacks against organizational infrastructure. The lack of vendor support and patches exacerbates the risk, forcing organizations to rely on network segmentation and other compensating controls to mitigate exposure.

Mitigation Recommendations

Since no patches are available due to the product being unsupported, European organizations should implement strict network segmentation to isolate affected devices from general network access. Restrict access to the subnet where these devices reside, limiting it only to trusted management stations and authorized personnel. Employ firewall rules to block inbound connections to port 6000 on these devices from unauthorized hosts. Disable or restrict DHCP usage to ensure the device retains the expected IP address (192.168.2.15), maintaining the intended X11 ACL restrictions. If feasible, disable the X11 display server startup on these devices or replace it with a more secure remote access method. Monitor network traffic for unusual connections to port 6000 and audit device logs for suspicious activity. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting X11 services. Finally, evaluate the feasibility of replacing unsupported devices with newer, supported models that do not exhibit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-07-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931a58604d931fa5b3e2607

Added to database: 12/4/2025, 3:15:18 PM

Last enriched: 12/11/2025, 10:03:19 PM

Last updated: 1/19/2026, 10:53:34 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats