Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59780: CWE-306 in General Industrial Controls Lynx+ Gateway

0
High
VulnerabilityCVE-2025-59780cvecve-2025-59780cwe-306
Published: Fri Nov 14 2025 (11/14/2025, 23:26:35 UTC)
Source: CVE Database V5
Vendor/Project: General Industrial Controls
Product: Lynx+ Gateway

Description

General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to send GET requests to obtain sensitive device information.

AI-Powered Analysis

AILast updated: 11/14/2025, 23:44:12 UTC

Technical Analysis

CVE-2025-59780 identifies a critical authentication bypass vulnerability in the embedded web server of the General Industrial Controls Lynx+ Gateway. The affected product versions include R08, V03, V05, and V18. The vulnerability arises because the web server does not enforce authentication on certain GET requests, allowing unauthenticated remote attackers to retrieve sensitive device information. This lack of authentication corresponds to CWE-306, which highlights missing authentication for critical functions. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. This means the attack can be performed remotely over the network without any privileges or user interaction, and the impact is high on confidentiality but does not affect integrity or availability. The exposed sensitive information could include configuration details, network settings, or operational data that attackers could leverage for further exploitation or reconnaissance. No public exploits have been reported yet, but the ease of exploitation and the critical nature of the information exposed make this a significant threat to industrial control systems. The Lynx+ Gateway is typically deployed in industrial environments for control and monitoring, making confidentiality breaches particularly concerning for operational security. The absence of patches at the time of publication necessitates immediate compensatory controls to reduce exposure.

Potential Impact

For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability presents a substantial risk. Disclosure of sensitive device information can facilitate targeted attacks, including sabotage, espionage, or disruption of industrial processes. Industrial sectors such as manufacturing, energy, utilities, and transportation that rely on General Industrial Controls Lynx+ Gateway devices could experience increased exposure to cyber espionage or operational disruptions. The confidentiality breach could lead to loss of intellectual property, exposure of network architecture, or identification of further vulnerabilities. Given the remote and unauthenticated nature of the exploit, attackers can scan and target vulnerable devices at scale, increasing the risk of widespread compromise. The lack of integrity and availability impact reduces the risk of immediate operational disruption but does not diminish the strategic threat posed by information leakage. European regulatory frameworks like NIS2 emphasize the protection of critical infrastructure, making timely mitigation essential to maintain compliance and operational resilience.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate Lynx+ Gateway devices from general IT networks and restrict access to trusted management networks only. 2. Deploy strict firewall rules to block unauthorized inbound traffic to the embedded web server ports, allowing only known and authorized IP addresses. 3. Monitor network traffic for unusual GET requests targeting the Lynx+ Gateway web server and establish alerting for suspicious access patterns. 4. If possible, disable the embedded web server or restrict its functionality until a vendor patch is available. 5. Conduct thorough asset inventories to identify all affected Lynx+ Gateway devices and prioritize their protection. 6. Engage with General Industrial Controls for updates on patches or firmware upgrades addressing this vulnerability. 7. Apply compensating controls such as VPN access with strong authentication for remote management interfaces. 8. Train operational technology (OT) security teams to recognize and respond to potential exploitation attempts. 9. Regularly review and update incident response plans to include scenarios involving information disclosure in industrial environments. 10. Consider deploying intrusion detection systems tailored for industrial protocols to detect anomalous behavior around these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-06T20:44:49.360Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6917bd92ed5947837247117f

Added to database: 11/14/2025, 11:38:58 PM

Last enriched: 11/14/2025, 11:44:12 PM

Last updated: 11/15/2025, 2:47:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats