Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62765: CWE-319 in General Industrial Controls Lynx+ Gateway

0
High
VulnerabilityCVE-2025-62765cvecve-2025-62765cwe-319
Published: Fri Nov 14 2025 (11/14/2025, 23:27:55 UTC)
Source: CVE Database V5
Vendor/Project: General Industrial Controls
Product: Lynx+ Gateway

Description

General Industrial Controls Lynx+ Gateway is vulnerable to a cleartext transmission vulnerability that could allow an attacker to observe network traffic to obtain sensitive information, including plaintext credentials.

AI-Powered Analysis

AILast updated: 11/14/2025, 23:44:24 UTC

Technical Analysis

CVE-2025-62765 is a vulnerability classified under CWE-319, which pertains to the transmission of sensitive information in cleartext. This vulnerability affects multiple versions (R08, V03, V05, V18) of the General Industrial Controls Lynx+ Gateway, a device commonly used in industrial control systems (ICS) environments. The core issue is that the device transmits sensitive data, including credentials, over the network without encryption. This allows an attacker with network access to passively intercept and capture this data, leading to potential unauthorized access or further exploitation. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (C:H) but no impact on integrity or availability. The vulnerability does not require authentication, making it easier for attackers to exploit if they can access the network segment. Although no public exploits have been reported yet, the cleartext transmission of credentials is a critical weakness in ICS environments, where confidentiality breaches can lead to operational disruptions or safety hazards. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate compensating controls.

Potential Impact

For European organizations, especially those operating critical infrastructure or industrial environments, this vulnerability poses a significant risk. The interception of plaintext credentials can lead to unauthorized access to industrial gateways, potentially allowing attackers to manipulate control systems or exfiltrate sensitive operational data. This could result in operational disruptions, safety incidents, or intellectual property theft. Given the reliance on industrial control systems in sectors such as manufacturing, energy, and utilities across Europe, the impact could extend to economic losses and national security concerns. The vulnerability's network-based exploitation means that attackers could operate remotely, increasing the threat surface. Organizations with insufficient network segmentation or monitoring are particularly vulnerable. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score underscores the urgency of addressing this issue.

Mitigation Recommendations

1. Immediately implement network-level encryption such as VPNs or IPsec tunnels to protect communications involving Lynx+ Gateway devices until a vendor patch is available. 2. Enforce strict network segmentation to isolate industrial control systems from general IT networks and limit access to trusted hosts only. 3. Deploy network intrusion detection systems (NIDS) with signatures or anomaly detection tailored to identify cleartext credential transmissions or unusual traffic patterns related to Lynx+ Gateway devices. 4. Conduct regular network traffic audits and packet captures to detect any unauthorized interception attempts. 5. Engage with General Industrial Controls for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment. 6. Implement strong access controls and multi-factor authentication on management interfaces to reduce the risk if credentials are compromised. 7. Train ICS security teams to recognize signs of credential interception and respond promptly. 8. Consider deploying compensating controls such as application-layer encryption or proxy devices that can enforce encrypted sessions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-06T20:44:49.374Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6917bd92ed59478372471183

Added to database: 11/14/2025, 11:38:58 PM

Last enriched: 11/14/2025, 11:44:24 PM

Last updated: 11/15/2025, 8:35:05 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats