CVE-2025-63205: n/a
An issue was discovered in bridgetech probes VB220 IP Network Probe,VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD, firmware versions 6.5.0-9, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint.
AI Analysis
Technical Summary
CVE-2025-63205 is a vulnerability identified in several Bridgetech network probes—specifically the VB220 IP Network Probe, VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD devices running firmware versions 6.5.0-9. The vulnerability stems from improper access control on the /probe/core/setup/passwd endpoint, which allows unauthenticated remote attackers to retrieve sensitive information, including administrator passwords. This is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N, A:N). The flaw enables attackers to compromise confidentiality by exposing administrator credentials without authentication or user interaction, which could lead to further compromise of the affected devices or networks. No public exploits have been reported yet, but the vulnerability is publicly disclosed as of November 19, 2025. The affected devices are typically used in broadcast and media production environments for network monitoring and analytics, making them critical infrastructure components in those sectors. The absence of available patches at the time of disclosure necessitates immediate mitigation through network segmentation and access controls.
Potential Impact
The primary impact of CVE-2025-63205 is the exposure of administrator passwords, which compromises the confidentiality of critical credentials. For European organizations, especially those in media production, broadcasting, and network monitoring sectors, this could lead to unauthorized access to network probes, enabling attackers to manipulate monitoring data, disrupt operations, or pivot to other internal systems. The lack of required authentication and user interaction makes exploitation straightforward, increasing the risk of widespread compromise. Although the vulnerability does not directly affect system integrity or availability, the exposure of administrative credentials can facilitate subsequent attacks that may impact these areas. Given the strategic importance of broadcast and media infrastructure in Europe, successful exploitation could disrupt content delivery, damage organizational reputation, and lead to regulatory compliance issues under GDPR due to unauthorized data access.
Mitigation Recommendations
1. Immediately restrict network access to the affected Bridgetech probes by implementing strict firewall rules and network segmentation, ensuring that only authorized management stations can communicate with these devices. 2. Monitor network traffic for unusual or unauthorized access attempts to the /probe/core/setup/passwd endpoint and set up alerts for suspicious activity. 3. Employ strong authentication and access control mechanisms on management interfaces where possible, even if the device firmware does not enforce them by default. 4. Coordinate with Bridgetech to obtain and apply firmware updates or patches as soon as they become available to remediate the vulnerability. 5. Conduct regular audits of device configurations and credentials to detect any unauthorized changes or exposures. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 7. Educate operational staff about the risks associated with these devices and the importance of maintaining strict access controls.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands
CVE-2025-63205: n/a
Description
An issue was discovered in bridgetech probes VB220 IP Network Probe,VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD, firmware versions 6.5.0-9, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2025-63205 is a vulnerability identified in several Bridgetech network probes—specifically the VB220 IP Network Probe, VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD devices running firmware versions 6.5.0-9. The vulnerability stems from improper access control on the /probe/core/setup/passwd endpoint, which allows unauthenticated remote attackers to retrieve sensitive information, including administrator passwords. This is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N, A:N). The flaw enables attackers to compromise confidentiality by exposing administrator credentials without authentication or user interaction, which could lead to further compromise of the affected devices or networks. No public exploits have been reported yet, but the vulnerability is publicly disclosed as of November 19, 2025. The affected devices are typically used in broadcast and media production environments for network monitoring and analytics, making them critical infrastructure components in those sectors. The absence of available patches at the time of disclosure necessitates immediate mitigation through network segmentation and access controls.
Potential Impact
The primary impact of CVE-2025-63205 is the exposure of administrator passwords, which compromises the confidentiality of critical credentials. For European organizations, especially those in media production, broadcasting, and network monitoring sectors, this could lead to unauthorized access to network probes, enabling attackers to manipulate monitoring data, disrupt operations, or pivot to other internal systems. The lack of required authentication and user interaction makes exploitation straightforward, increasing the risk of widespread compromise. Although the vulnerability does not directly affect system integrity or availability, the exposure of administrative credentials can facilitate subsequent attacks that may impact these areas. Given the strategic importance of broadcast and media infrastructure in Europe, successful exploitation could disrupt content delivery, damage organizational reputation, and lead to regulatory compliance issues under GDPR due to unauthorized data access.
Mitigation Recommendations
1. Immediately restrict network access to the affected Bridgetech probes by implementing strict firewall rules and network segmentation, ensuring that only authorized management stations can communicate with these devices. 2. Monitor network traffic for unusual or unauthorized access attempts to the /probe/core/setup/passwd endpoint and set up alerts for suspicious activity. 3. Employ strong authentication and access control mechanisms on management interfaces where possible, even if the device firmware does not enforce them by default. 4. Coordinate with Bridgetech to obtain and apply firmware updates or patches as soon as they become available to remediate the vulnerability. 5. Conduct regular audits of device configurations and credentials to detect any unauthorized changes or exposures. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 7. Educate operational staff about the risks associated with these devices and the importance of maintaining strict access controls.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691dfee093c808727dc4717a
Added to database: 11/19/2025, 5:31:12 PM
Last enriched: 11/26/2025, 5:58:22 PM
Last updated: 1/7/2026, 4:17:27 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.