CVE-2025-63205: n/a
An issue was discovered in bridgetech probes VB220 IP Network Probe,VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD, firmware versions 6.5.0-9, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint. NOTE: the Supplier disagrees that 6.5.0-9 is affected, and instead reports that 5.6.0-3 and earlier are affected, and 5.6.0-4 (2020-09-21) and later are fixed.
AI Analysis
Technical Summary
CVE-2025-63205 is a vulnerability identified in several Bridgetech probe devices, including the VB220 IP Network Probe, VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD. These devices run firmware versions reportedly from 6.5.0-9, although the supplier disputes this and states that only versions 5.6.0-3 and earlier are affected, with fixes applied from 5.6.0-4 onward. The vulnerability resides in the /probe/core/setup/passwd endpoint, which improperly exposes sensitive information such as administrator passwords without requiring authentication. This represents a classic CWE-200 (Information Exposure) flaw. The vulnerability can be exploited remotely over the network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality, with no direct effect on integrity or availability. The flaw allows attackers to retrieve administrator credentials, potentially enabling further unauthorized access or lateral movement within affected environments. No public exploits have been reported yet, but the high CVSS score (7.5) underscores the criticality of addressing this issue promptly. The disagreement on affected versions necessitates careful verification of firmware versions in deployed devices to ensure proper mitigation.
Potential Impact
For European organizations, the exposure of administrator passwords on Bridgetech probes could lead to unauthorized access to critical network monitoring and production analytics infrastructure. This could compromise the confidentiality of sensitive operational data and potentially enable attackers to manipulate or disrupt network monitoring processes indirectly. Given that these probes are used in IP network monitoring and ST 2110 production analytics, sectors such as broadcasting, telecommunications, and critical infrastructure monitoring could be particularly impacted. The breach of administrator credentials could facilitate further attacks, including espionage, data exfiltration, or sabotage. The lack of authentication requirement and remote exploitability increases the risk, especially for probes accessible from less secure network segments or exposed to the internet. The impact is primarily on confidentiality, but the downstream effects could affect operational integrity if attackers leverage the credentials for further intrusion. Organizations relying on these devices must assess their exposure and prioritize patching or mitigating this vulnerability to prevent potential compromise.
Mitigation Recommendations
1. Verify the exact firmware version of all deployed Bridgetech probes to determine if they fall within the vulnerable range. 2. Upgrade all affected devices to firmware version 5.6.0-4 or later, or the latest available version confirmed by the supplier to contain the fix. 3. If immediate patching is not feasible, restrict network access to the probes by implementing strict firewall rules limiting access to trusted management networks only. 4. Monitor network traffic for unusual access attempts to the /probe/core/setup/passwd endpoint and implement intrusion detection rules to alert on such activity. 5. Change all administrator passwords on affected devices after patching to invalidate any potentially compromised credentials. 6. Conduct regular audits of device configurations and access logs to detect any unauthorized access. 7. Engage with the vendor for official advisories and updates to ensure alignment with their remediation guidance. 8. Consider network segmentation to isolate monitoring probes from general user networks and the internet to reduce exposure. 9. Implement multi-factor authentication if supported by the devices to add an additional layer of security. 10. Educate network and security teams about this vulnerability and the importance of timely patch management for embedded network devices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-63205: n/a
Description
An issue was discovered in bridgetech probes VB220 IP Network Probe,VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD, firmware versions 6.5.0-9, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint. NOTE: the Supplier disagrees that 6.5.0-9 is affected, and instead reports that 5.6.0-3 and earlier are affected, and 5.6.0-4 (2020-09-21) and later are fixed.
AI-Powered Analysis
Technical Analysis
CVE-2025-63205 is a vulnerability identified in several Bridgetech probe devices, including the VB220 IP Network Probe, VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD. These devices run firmware versions reportedly from 6.5.0-9, although the supplier disputes this and states that only versions 5.6.0-3 and earlier are affected, with fixes applied from 5.6.0-4 onward. The vulnerability resides in the /probe/core/setup/passwd endpoint, which improperly exposes sensitive information such as administrator passwords without requiring authentication. This represents a classic CWE-200 (Information Exposure) flaw. The vulnerability can be exploited remotely over the network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality, with no direct effect on integrity or availability. The flaw allows attackers to retrieve administrator credentials, potentially enabling further unauthorized access or lateral movement within affected environments. No public exploits have been reported yet, but the high CVSS score (7.5) underscores the criticality of addressing this issue promptly. The disagreement on affected versions necessitates careful verification of firmware versions in deployed devices to ensure proper mitigation.
Potential Impact
For European organizations, the exposure of administrator passwords on Bridgetech probes could lead to unauthorized access to critical network monitoring and production analytics infrastructure. This could compromise the confidentiality of sensitive operational data and potentially enable attackers to manipulate or disrupt network monitoring processes indirectly. Given that these probes are used in IP network monitoring and ST 2110 production analytics, sectors such as broadcasting, telecommunications, and critical infrastructure monitoring could be particularly impacted. The breach of administrator credentials could facilitate further attacks, including espionage, data exfiltration, or sabotage. The lack of authentication requirement and remote exploitability increases the risk, especially for probes accessible from less secure network segments or exposed to the internet. The impact is primarily on confidentiality, but the downstream effects could affect operational integrity if attackers leverage the credentials for further intrusion. Organizations relying on these devices must assess their exposure and prioritize patching or mitigating this vulnerability to prevent potential compromise.
Mitigation Recommendations
1. Verify the exact firmware version of all deployed Bridgetech probes to determine if they fall within the vulnerable range. 2. Upgrade all affected devices to firmware version 5.6.0-4 or later, or the latest available version confirmed by the supplier to contain the fix. 3. If immediate patching is not feasible, restrict network access to the probes by implementing strict firewall rules limiting access to trusted management networks only. 4. Monitor network traffic for unusual access attempts to the /probe/core/setup/passwd endpoint and implement intrusion detection rules to alert on such activity. 5. Change all administrator passwords on affected devices after patching to invalidate any potentially compromised credentials. 6. Conduct regular audits of device configurations and access logs to detect any unauthorized access. 7. Engage with the vendor for official advisories and updates to ensure alignment with their remediation guidance. 8. Consider network segmentation to isolate monitoring probes from general user networks and the internet to reduce exposure. 9. Implement multi-factor authentication if supported by the devices to add an additional layer of security. 10. Educate network and security teams about this vulnerability and the importance of timely patch management for embedded network devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691dfee093c808727dc4717a
Added to database: 11/19/2025, 5:31:12 PM
Last enriched: 2/4/2026, 8:34:53 AM
Last updated: 2/7/2026, 7:26:33 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.