CVE-2025-59780: CWE-306 in General Industrial Controls Lynx+ Gateway
General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to send GET requests to obtain sensitive device information.
AI Analysis
Technical Summary
CVE-2025-59780 identifies a critical authentication bypass vulnerability in the embedded web server of the General Industrial Controls Lynx+ Gateway. The affected product versions include R08, V03, V05, and V18. The vulnerability arises because the web server does not enforce authentication on certain GET requests, allowing unauthenticated remote attackers to retrieve sensitive device information. This lack of authentication corresponds to CWE-306, which highlights missing authentication for critical functions. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. This means the attack can be performed remotely over the network without any privileges or user interaction, and the impact is high on confidentiality but does not affect integrity or availability. The exposed sensitive information could include configuration details, network settings, or operational data that attackers could leverage for further exploitation or reconnaissance. No public exploits have been reported yet, but the ease of exploitation and the critical nature of the information exposed make this a significant threat to industrial control systems. The Lynx+ Gateway is typically deployed in industrial environments for control and monitoring, making confidentiality breaches particularly concerning for operational security. The absence of patches at the time of publication necessitates immediate compensatory controls to reduce exposure.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability presents a substantial risk. Disclosure of sensitive device information can facilitate targeted attacks, including sabotage, espionage, or disruption of industrial processes. Industrial sectors such as manufacturing, energy, utilities, and transportation that rely on General Industrial Controls Lynx+ Gateway devices could experience increased exposure to cyber espionage or operational disruptions. The confidentiality breach could lead to loss of intellectual property, exposure of network architecture, or identification of further vulnerabilities. Given the remote and unauthenticated nature of the exploit, attackers can scan and target vulnerable devices at scale, increasing the risk of widespread compromise. The lack of integrity and availability impact reduces the risk of immediate operational disruption but does not diminish the strategic threat posed by information leakage. European regulatory frameworks like NIS2 emphasize the protection of critical infrastructure, making timely mitigation essential to maintain compliance and operational resilience.
Mitigation Recommendations
1. Immediately implement network segmentation to isolate Lynx+ Gateway devices from general IT networks and restrict access to trusted management networks only. 2. Deploy strict firewall rules to block unauthorized inbound traffic to the embedded web server ports, allowing only known and authorized IP addresses. 3. Monitor network traffic for unusual GET requests targeting the Lynx+ Gateway web server and establish alerting for suspicious access patterns. 4. If possible, disable the embedded web server or restrict its functionality until a vendor patch is available. 5. Conduct thorough asset inventories to identify all affected Lynx+ Gateway devices and prioritize their protection. 6. Engage with General Industrial Controls for updates on patches or firmware upgrades addressing this vulnerability. 7. Apply compensating controls such as VPN access with strong authentication for remote management interfaces. 8. Train operational technology (OT) security teams to recognize and respond to potential exploitation attempts. 9. Regularly review and update incident response plans to include scenarios involving information disclosure in industrial environments. 10. Consider deploying intrusion detection systems tailored for industrial protocols to detect anomalous behavior around these devices.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2025-59780: CWE-306 in General Industrial Controls Lynx+ Gateway
Description
General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to send GET requests to obtain sensitive device information.
AI-Powered Analysis
Technical Analysis
CVE-2025-59780 identifies a critical authentication bypass vulnerability in the embedded web server of the General Industrial Controls Lynx+ Gateway. The affected product versions include R08, V03, V05, and V18. The vulnerability arises because the web server does not enforce authentication on certain GET requests, allowing unauthenticated remote attackers to retrieve sensitive device information. This lack of authentication corresponds to CWE-306, which highlights missing authentication for critical functions. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. This means the attack can be performed remotely over the network without any privileges or user interaction, and the impact is high on confidentiality but does not affect integrity or availability. The exposed sensitive information could include configuration details, network settings, or operational data that attackers could leverage for further exploitation or reconnaissance. No public exploits have been reported yet, but the ease of exploitation and the critical nature of the information exposed make this a significant threat to industrial control systems. The Lynx+ Gateway is typically deployed in industrial environments for control and monitoring, making confidentiality breaches particularly concerning for operational security. The absence of patches at the time of publication necessitates immediate compensatory controls to reduce exposure.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability presents a substantial risk. Disclosure of sensitive device information can facilitate targeted attacks, including sabotage, espionage, or disruption of industrial processes. Industrial sectors such as manufacturing, energy, utilities, and transportation that rely on General Industrial Controls Lynx+ Gateway devices could experience increased exposure to cyber espionage or operational disruptions. The confidentiality breach could lead to loss of intellectual property, exposure of network architecture, or identification of further vulnerabilities. Given the remote and unauthenticated nature of the exploit, attackers can scan and target vulnerable devices at scale, increasing the risk of widespread compromise. The lack of integrity and availability impact reduces the risk of immediate operational disruption but does not diminish the strategic threat posed by information leakage. European regulatory frameworks like NIS2 emphasize the protection of critical infrastructure, making timely mitigation essential to maintain compliance and operational resilience.
Mitigation Recommendations
1. Immediately implement network segmentation to isolate Lynx+ Gateway devices from general IT networks and restrict access to trusted management networks only. 2. Deploy strict firewall rules to block unauthorized inbound traffic to the embedded web server ports, allowing only known and authorized IP addresses. 3. Monitor network traffic for unusual GET requests targeting the Lynx+ Gateway web server and establish alerting for suspicious access patterns. 4. If possible, disable the embedded web server or restrict its functionality until a vendor patch is available. 5. Conduct thorough asset inventories to identify all affected Lynx+ Gateway devices and prioritize their protection. 6. Engage with General Industrial Controls for updates on patches or firmware upgrades addressing this vulnerability. 7. Apply compensating controls such as VPN access with strong authentication for remote management interfaces. 8. Train operational technology (OT) security teams to recognize and respond to potential exploitation attempts. 9. Regularly review and update incident response plans to include scenarios involving information disclosure in industrial environments. 10. Consider deploying intrusion detection systems tailored for industrial protocols to detect anomalous behavior around these devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-11-06T20:44:49.360Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6917bd92ed5947837247117f
Added to database: 11/14/2025, 11:38:58 PM
Last enriched: 11/14/2025, 11:44:12 PM
Last updated: 11/15/2025, 2:47:40 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-6596: Uncontrolled Resource Consumption
HighCVE-2025-9317: CWE-327 in AVEVA Edge
HighCVE-2025-8386: CWE-80 in AVEVA Application Server
MediumCVE-2025-64309: CWE-523 in Brightpick AI Brightpick Mission Control / Internal Logic Control
HighCVE-2025-64308: CWE-523 in Brightpick AI Brightpick Mission Control / Internal Logic Control
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.