Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63221: n/a

0
Critical
VulnerabilityCVE-2025-63221cvecve-2025-63221
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Axel Technology puma devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.

AI-Powered Analysis

AILast updated: 12/18/2025, 00:04:24 UTC

Technical Analysis

CVE-2025-63221 is a critical broken access control vulnerability found in Axel Technology puma devices running firmware versions 0.8.5 through 1.0.3. The vulnerability resides in the /cgi-bin/gstFcgi.fcgi endpoint, which does not enforce any authentication mechanisms. This design flaw allows unauthenticated remote attackers to perform sensitive operations such as enumerating existing user accounts, creating new administrative users, deleting legitimate users, and modifying device system settings. These capabilities effectively grant attackers full administrative control over the affected device. The vulnerability is remotely exploitable over the network without any user interaction or prior authentication, increasing the attack surface and ease of exploitation. The CVSS v3.1 base score of 9.1 reflects the critical impact on confidentiality and integrity, with no impact on availability. Although no public exploits have been reported yet, the severity and ease of exploitation make this a significant threat. The vulnerability is categorized under CWE-284 (Improper Access Control), highlighting a fundamental security design failure. The lack of available patches or firmware updates at the time of publication necessitates immediate deployment of compensating controls such as network access restrictions and enhanced monitoring to mitigate risk.

Potential Impact

For European organizations, exploitation of CVE-2025-63221 could lead to complete compromise of affected Axel Technology puma devices, which may be integral to network infrastructure or industrial control systems. Unauthorized administrative access could enable attackers to manipulate device configurations, disrupt operations, or use the compromised devices as footholds for lateral movement within networks. Confidentiality breaches could expose sensitive user account information, while integrity violations could alter system settings critical to operational stability. Although availability is not directly impacted, the indirect effects of unauthorized changes could cause service disruptions. The risk is particularly acute for sectors reliant on these devices for critical infrastructure, including energy, manufacturing, and telecommunications. The absence of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. European organizations must consider the potential for espionage, sabotage, or ransomware attacks leveraging this vulnerability.

Mitigation Recommendations

1. Immediately restrict network access to the /cgi-bin/gstFcgi.fcgi endpoint by implementing firewall rules or access control lists limiting connections to trusted management networks only. 2. Employ network segmentation to isolate vulnerable Axel Technology puma devices from general enterprise networks and the internet. 3. Monitor network traffic and device logs for unusual activities such as unauthorized user account creation or configuration changes. 4. Disable or remove unnecessary services and endpoints on the devices where possible to reduce the attack surface. 5. Engage with Axel Technology support channels to obtain information on firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. Conduct regular vulnerability assessments and penetration testing focusing on device management interfaces. 7. Implement multi-factor authentication and strong credential policies on all administrative interfaces if supported by the device. 8. Develop and test incident response plans specific to device compromise scenarios to ensure rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691de8ff964c14ffeea99623

Added to database: 11/19/2025, 3:57:51 PM

Last enriched: 12/18/2025, 12:04:24 AM

Last updated: 1/7/2026, 4:17:54 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats