CVE-2025-58272: Cross-site request forgery (CSRF) in NTT EAST, Inc. Web Caster V130
Cross-site request forgery vulnerability exists in Web Caster V130 versions 1.08 and earlier. If a logged-in user views a malicious page created by an attacker, the settings of the product may be unintentionally changed.
AI Analysis
Technical Summary
CVE-2025-58272 is a cross-site request forgery (CSRF) vulnerability affecting NTT EAST, Inc.'s Web Caster V130 device, specifically versions 1.08 and earlier. This vulnerability allows an attacker to trick a logged-in user into executing unwanted actions on the Web Caster device by having them visit a maliciously crafted webpage. Since the user is already authenticated, the malicious webpage can cause the device's settings to be changed without the user's consent. The vulnerability requires the user to be logged in and to interact by visiting the attacker's page, which means user interaction is necessary. The CVSS 3.0 base score is 3.7, indicating a low severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same or a logically adjacent network segment. The attack complexity is high (AC:H), and no privileges are required (PR:N). The vulnerability impacts integrity and availability slightly (I:L, A:L) but does not affect confidentiality (C:N). There are no known exploits in the wild, and no patches or mitigation links have been provided yet. The vulnerability is typical of CSRF issues where insufficient validation of request origin allows unauthorized state-changing requests to be executed under the context of an authenticated user session.
Potential Impact
For European organizations using the Web Caster V130 device, this vulnerability could lead to unauthorized changes in device configurations, potentially disrupting network services or weakening security postures. Although the impact on confidentiality is none, integrity and availability impacts could cause operational disruptions or misconfigurations that might be exploited further. Since the attack requires user interaction and adjacency to the network, the risk is somewhat limited to internal or local network environments. However, in environments where these devices are used for critical network functions or as gateways, unauthorized configuration changes could lead to service outages or create openings for further attacks. The low CVSS score reflects the limited scope and complexity of exploitation, but organizations should still consider the operational impact of any unauthorized configuration changes.
Mitigation Recommendations
European organizations should implement strict network segmentation to limit access to the Web Caster V130 devices, ensuring that only trusted users on trusted networks can reach the device management interfaces. Employing web application firewalls (WAFs) that can detect and block CSRF attack patterns may provide additional protection. Organizations should educate users about the risks of clicking on unknown or suspicious links, especially when logged into sensitive devices. Since no patches are currently available, disabling remote management or restricting management access to specific IP addresses or VPNs can reduce exposure. Monitoring device configuration changes and maintaining logs can help detect unauthorized modifications quickly. Once a patch or firmware update is released by NTT EAST, organizations should prioritize applying it promptly. Additionally, implementing multi-factor authentication (MFA) for device management interfaces, if supported, can reduce the risk of unauthorized actions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-58272: Cross-site request forgery (CSRF) in NTT EAST, Inc. Web Caster V130
Description
Cross-site request forgery vulnerability exists in Web Caster V130 versions 1.08 and earlier. If a logged-in user views a malicious page created by an attacker, the settings of the product may be unintentionally changed.
AI-Powered Analysis
Technical Analysis
CVE-2025-58272 is a cross-site request forgery (CSRF) vulnerability affecting NTT EAST, Inc.'s Web Caster V130 device, specifically versions 1.08 and earlier. This vulnerability allows an attacker to trick a logged-in user into executing unwanted actions on the Web Caster device by having them visit a maliciously crafted webpage. Since the user is already authenticated, the malicious webpage can cause the device's settings to be changed without the user's consent. The vulnerability requires the user to be logged in and to interact by visiting the attacker's page, which means user interaction is necessary. The CVSS 3.0 base score is 3.7, indicating a low severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same or a logically adjacent network segment. The attack complexity is high (AC:H), and no privileges are required (PR:N). The vulnerability impacts integrity and availability slightly (I:L, A:L) but does not affect confidentiality (C:N). There are no known exploits in the wild, and no patches or mitigation links have been provided yet. The vulnerability is typical of CSRF issues where insufficient validation of request origin allows unauthorized state-changing requests to be executed under the context of an authenticated user session.
Potential Impact
For European organizations using the Web Caster V130 device, this vulnerability could lead to unauthorized changes in device configurations, potentially disrupting network services or weakening security postures. Although the impact on confidentiality is none, integrity and availability impacts could cause operational disruptions or misconfigurations that might be exploited further. Since the attack requires user interaction and adjacency to the network, the risk is somewhat limited to internal or local network environments. However, in environments where these devices are used for critical network functions or as gateways, unauthorized configuration changes could lead to service outages or create openings for further attacks. The low CVSS score reflects the limited scope and complexity of exploitation, but organizations should still consider the operational impact of any unauthorized configuration changes.
Mitigation Recommendations
European organizations should implement strict network segmentation to limit access to the Web Caster V130 devices, ensuring that only trusted users on trusted networks can reach the device management interfaces. Employing web application firewalls (WAFs) that can detect and block CSRF attack patterns may provide additional protection. Organizations should educate users about the risks of clicking on unknown or suspicious links, especially when logged into sensitive devices. Since no patches are currently available, disabling remote management or restricting management access to specific IP addresses or VPNs can reduce exposure. Monitoring device configuration changes and maintaining logs can help detect unauthorized modifications quickly. Once a patch or firmware update is released by NTT EAST, organizations should prioritize applying it promptly. Additionally, implementing multi-factor authentication (MFA) for device management interfaces, if supported, can reduce the risk of unauthorized actions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-08-27T23:47:30.395Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68b7d300ad5a09ad00ed52c0
Added to database: 9/3/2025, 5:32:48 AM
Last enriched: 9/3/2025, 5:47:42 AM
Last updated: 9/4/2025, 10:24:37 PM
Views: 14
Related Threats
CVE-2025-58362: CWE-706: Use of Incorrectly-Resolved Name or Reference in honojs hono
HighCVE-2025-58179: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro
HighCVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
MediumCVE-2025-58352: CWE-613: Insufficient Session Expiration in WeblateOrg weblate
LowCVE-2025-55244: CWE-284: Improper Access Control in Microsoft Azure Bot Service
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.