Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63205: n/a

0
High
VulnerabilityCVE-2025-63205cvecve-2025-63205
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in bridgetech probes VB220 IP Network Probe,VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD, firmware versions 6.5.0-9, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint.

AI-Powered Analysis

AILast updated: 11/26/2025, 17:58:22 UTC

Technical Analysis

CVE-2025-63205 is a vulnerability identified in several Bridgetech network probes—specifically the VB220 IP Network Probe, VB120 Embedded IP + RF Probe, VB330 High-Capacity Probe, VB440 ST 2110 Production Analytics Probe, and NOMAD devices running firmware versions 6.5.0-9. The vulnerability stems from improper access control on the /probe/core/setup/passwd endpoint, which allows unauthenticated remote attackers to retrieve sensitive information, including administrator passwords. This is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N, A:N). The flaw enables attackers to compromise confidentiality by exposing administrator credentials without authentication or user interaction, which could lead to further compromise of the affected devices or networks. No public exploits have been reported yet, but the vulnerability is publicly disclosed as of November 19, 2025. The affected devices are typically used in broadcast and media production environments for network monitoring and analytics, making them critical infrastructure components in those sectors. The absence of available patches at the time of disclosure necessitates immediate mitigation through network segmentation and access controls.

Potential Impact

The primary impact of CVE-2025-63205 is the exposure of administrator passwords, which compromises the confidentiality of critical credentials. For European organizations, especially those in media production, broadcasting, and network monitoring sectors, this could lead to unauthorized access to network probes, enabling attackers to manipulate monitoring data, disrupt operations, or pivot to other internal systems. The lack of required authentication and user interaction makes exploitation straightforward, increasing the risk of widespread compromise. Although the vulnerability does not directly affect system integrity or availability, the exposure of administrative credentials can facilitate subsequent attacks that may impact these areas. Given the strategic importance of broadcast and media infrastructure in Europe, successful exploitation could disrupt content delivery, damage organizational reputation, and lead to regulatory compliance issues under GDPR due to unauthorized data access.

Mitigation Recommendations

1. Immediately restrict network access to the affected Bridgetech probes by implementing strict firewall rules and network segmentation, ensuring that only authorized management stations can communicate with these devices. 2. Monitor network traffic for unusual or unauthorized access attempts to the /probe/core/setup/passwd endpoint and set up alerts for suspicious activity. 3. Employ strong authentication and access control mechanisms on management interfaces where possible, even if the device firmware does not enforce them by default. 4. Coordinate with Bridgetech to obtain and apply firmware updates or patches as soon as they become available to remediate the vulnerability. 5. Conduct regular audits of device configurations and credentials to detect any unauthorized changes or exposures. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 7. Educate operational staff about the risks associated with these devices and the importance of maintaining strict access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691dfee093c808727dc4717a

Added to database: 11/19/2025, 5:31:12 PM

Last enriched: 11/26/2025, 5:58:22 PM

Last updated: 1/7/2026, 4:17:27 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats