Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58423: CWE-22 in Advantech DeviceOn/iEdge

0
High
VulnerabilityCVE-2025-58423cvecve-2025-58423cwe-22
Published: Thu Nov 06 2025 (11/06/2025, 22:31:02 UTC)
Source: CVE Database V5
Vendor/Project: Advantech
Product: DeviceOn/iEdge

Description

Due to insufficient sanitization, an attacker can upload a specially crafted configuration file to cause a denial-of-service condition, traverse directories, or read/write files, within the context of the local system account.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:26:44 UTC

Technical Analysis

CVE-2025-58423 is a critical vulnerability identified in Advantech's DeviceOn/iEdge platform, which is widely used for industrial device management and IoT edge computing. The root cause is insufficient sanitization of uploaded configuration files, enabling an attacker to perform directory traversal attacks (CWE-22). This allows malicious actors to upload specially crafted configuration files that can traverse directories beyond intended paths, leading to unauthorized file read/write operations and potentially causing denial-of-service conditions. The vulnerability operates within the context of the local system account, granting high privileges to the attacker once exploited. The CVSS 3.1 base score of 8.8 reflects its high impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, and requiring only low privileges without user interaction. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the critical nature of the affected systems in industrial environments. The lack of available patches at the time of publication necessitates immediate risk mitigation through compensating controls. This vulnerability could be leveraged to disrupt industrial processes, exfiltrate sensitive configuration data, or implant persistent malicious configurations, severely impacting operational technology environments.

Potential Impact

For European organizations, especially those in manufacturing, energy, transportation, and critical infrastructure sectors relying on Advantech DeviceOn/iEdge, this vulnerability could lead to severe operational disruptions. Exploitation may result in denial-of-service conditions that halt industrial processes, unauthorized access to sensitive configuration files that could reveal network topology or credentials, and unauthorized modification of files that could alter device behavior or introduce backdoors. The compromise of system integrity and availability could have cascading effects on supply chains and critical services. Given the high privileges under which the vulnerability operates, attackers could gain persistent control over affected devices, undermining trust in industrial control systems. The impact is heightened in Europe due to the continent's extensive industrial base and reliance on IoT and edge computing for automation and monitoring. Additionally, regulatory frameworks like NIS2 and GDPR increase the importance of securing such vulnerabilities to avoid legal and financial penalties.

Mitigation Recommendations

1. Immediately restrict file upload permissions to trusted administrators only and enforce strict access controls on configuration file management interfaces. 2. Implement rigorous input validation and sanitization on all uploaded files, ensuring that directory traversal characters and patterns are blocked or sanitized. 3. Monitor file system changes and configuration uploads in real-time using host-based intrusion detection systems (HIDS) tailored for industrial environments. 4. Segment and isolate DeviceOn/iEdge devices from critical network segments to limit lateral movement in case of compromise. 5. Employ network-level controls such as firewalls and intrusion prevention systems (IPS) to detect and block suspicious upload attempts. 6. Regularly audit device configurations and logs for unauthorized changes or anomalies. 7. Engage with Advantech for timely patch releases and apply updates as soon as they become available. 8. Conduct security awareness training for administrators managing these devices to recognize and respond to suspicious activities. 9. Consider deploying application whitelisting and endpoint protection solutions compatible with industrial devices to prevent unauthorized code execution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-05T16:45:22.604Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d258e790724a13ccd5543

Added to database: 11/6/2025, 10:47:42 PM

Last enriched: 12/1/2025, 4:26:44 PM

Last updated: 12/23/2025, 4:38:39 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats