Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63208: n/a

0
High
VulnerabilityCVE-2025-63208cvecve-2025-63208
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in bridgetech VB288 Objective QoE Content Extractor, firmware version 5.6.0-8, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:54:50 UTC

Technical Analysis

CVE-2025-63208 is a vulnerability identified in the Bridgetech VB288 Objective QoE Content Extractor firmware version 5.6.0-8. The flaw resides in an unauthenticated HTTP endpoint (/probe/core/setup/passwd) that exposes sensitive information, including administrator passwords. This endpoint does not require any form of authentication or user interaction, making it accessible to remote attackers over the network. The vulnerability is classified under CWE-312, which relates to the cleartext storage or transmission of sensitive information. The CVSS 3.1 base score of 7.5 reflects a high severity due to the ease of exploitation (network accessible, no privileges required) and the high confidentiality impact (disclosure of administrator credentials). Although no known exploits have been reported in the wild, the exposure of administrator passwords can lead to unauthorized access, privilege escalation, and potential control over the affected device. The lack of available patches or updates at this time increases the urgency for organizations to implement compensating controls. The vulnerability affects the firmware version 5.6.0-8 specifically, but the absence of detailed affected version information suggests that other versions should also be evaluated for similar exposure.

Potential Impact

For European organizations, the exposure of administrator passwords on Bridgetech VB288 devices can have severe consequences. These devices may be used in network monitoring, quality of experience measurement, or content extraction roles, potentially within telecommunications, media, or critical infrastructure sectors. Unauthorized access could lead to manipulation or disruption of monitoring data, loss of confidentiality of sensitive operational information, and lateral movement within networks. The compromise of administrative credentials could also facilitate further attacks, including installation of malware or data exfiltration. Given the network-accessible nature of the vulnerability and lack of authentication, attackers can exploit this remotely, increasing the risk of widespread impact. Organizations relying on these devices without adequate network segmentation or access controls are particularly vulnerable. The absence of patches means that the risk remains until mitigations are applied or updates are released.

Mitigation Recommendations

1. Immediately restrict network access to the /probe/core/setup/passwd endpoint by implementing firewall rules or access control lists (ACLs) to limit access to trusted management networks only. 2. Employ network segmentation to isolate Bridgetech VB288 devices from general user and internet-facing networks, reducing exposure. 3. Monitor network traffic and device logs for any unauthorized or suspicious access attempts targeting the vulnerable endpoint. 4. Change all administrator passwords on affected devices to strong, unique credentials after ensuring no compromise has occurred. 5. Engage with Bridgetech support or vendors to obtain firmware updates or patches as soon as they become available. 6. If possible, disable or restrict the vulnerable endpoint functionality until a patch is applied. 7. Conduct a thorough security assessment of all devices running the affected firmware version to identify and remediate potential compromises. 8. Implement multi-factor authentication (MFA) for device management interfaces where supported to add an additional layer of security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e026693c808727dc91d26

Added to database: 11/19/2025, 5:46:14 PM

Last enriched: 11/26/2025, 6:54:50 PM

Last updated: 1/7/2026, 8:48:10 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats