Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63209: n/a

0
High
VulnerabilityCVE-2025-63209cvecve-2025-63209
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The ELCA Star Transmitter Remote Control firmware 1.25 for STAR150, BP1000, STAR300, STAR2000, STAR1000, STAR500, and possibly other models, contains an information disclosure vulnerability allowing unauthenticated attackers to retrieve admin credentials and system settings via an unprotected /setup.xml endpoint. The admin password is stored in plaintext under the <p05> XML tag, potentially leading to remote compromise of the transmitter system.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:06:56 UTC

Technical Analysis

The vulnerability identified as CVE-2025-63209 affects ELCA Star Transmitter Remote Control firmware version 1.25 across multiple transmitter models including STAR150, BP1000, STAR300, STAR2000, STAR1000, and STAR500. The core issue is an information disclosure vulnerability stemming from an unprotected /setup.xml endpoint accessible over the network without any authentication or user interaction. This endpoint contains sensitive system configuration data, notably the administrator password stored in plaintext within the <p05> XML tag. Because the password is not encrypted or hashed, an attacker can easily retrieve it by sending a simple HTTP request to the endpoint. Once the admin credentials are obtained, the attacker can remotely access and control the transmitter system, potentially altering configurations, disrupting broadcasts, or using the device as a foothold for further network intrusion. The CVSS 3.1 base score of 7.5 reflects the vulnerability’s high impact on confidentiality, ease of exploitation (network vector, no privileges or user interaction required), and unchanged integrity or availability. No patches or firmware updates are currently available, and no exploits have been observed in the wild, but the vulnerability’s characteristics make it a critical concern for organizations relying on these devices. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

Potential Impact

For European organizations, especially broadcasters, telecommunications providers, and critical infrastructure operators using ELCA Star Transmitter devices, this vulnerability poses a significant risk. Unauthorized disclosure of admin credentials can lead to remote compromise of transmitter systems, enabling attackers to manipulate broadcast signals, disrupt communications, or gain persistent access to internal networks. This could result in operational downtime, loss of service integrity, reputational damage, and potential regulatory penalties under GDPR if personal data or critical services are impacted. The lack of authentication and plaintext password storage means attackers can exploit this vulnerability remotely and stealthily, increasing the threat level. Given the strategic importance of broadcasting and communication infrastructure in Europe, successful exploitation could also have national security implications. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention.

Mitigation Recommendations

1. Immediately restrict network access to the /setup.xml endpoint by implementing firewall rules or access control lists (ACLs) to allow only trusted management IP addresses. 2. Employ network segmentation to isolate transmitter devices from general enterprise networks and the internet, reducing exposure. 3. Monitor network traffic for unusual requests targeting /setup.xml or other configuration endpoints. 4. Change default or known admin passwords on affected devices to strong, unique credentials once access is secured. 5. Engage with ELCA or authorized vendors to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6. If firmware updates are not yet available, consider temporary compensating controls such as VPN access for device management or disabling remote management features where feasible. 7. Conduct regular security audits and vulnerability assessments on transmitter infrastructure to detect similar issues. 8. Train operational staff on the risks of exposing management interfaces and the importance of secure configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e026693c808727dc91d2a

Added to database: 11/19/2025, 5:46:14 PM

Last enriched: 11/26/2025, 6:06:56 PM

Last updated: 1/7/2026, 4:17:36 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats