Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64302: CWE-79 in Advantech DeviceOn/iEdge

0
Medium
VulnerabilityCVE-2025-64302cvecve-2025-64302cwe-79
Published: Thu Nov 06 2025 (11/06/2025, 22:24:15 UTC)
Source: CVE Database V5
Vendor/Project: Advantech
Product: DeviceOn/iEdge

Description

Insufficient input sanitization in the dashboard label or path can allow an attacker to trigger a device error causing information disclosure or data manipulation.

AI-Powered Analysis

AILast updated: 11/06/2025, 22:50:59 UTC

Technical Analysis

CVE-2025-64302 is a vulnerability classified under CWE-79 (Cross-Site Scripting) found in Advantech's DeviceOn/iEdge platform, a solution commonly used for industrial device management and IoT edge computing. The root cause is insufficient input sanitization on user-controllable fields such as dashboard labels or paths. This flaw allows an attacker to inject malicious scripts or crafted input that triggers device errors. Exploitation can lead to limited information disclosure and unauthorized data manipulation within the device management interface. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and can be exploited remotely over the network (AV:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The CVSS v3.1 base score is 6.4, indicating medium severity with impacts on confidentiality and integrity but no availability impact. No patches or exploits are currently known, but the vulnerability poses a risk especially in environments where DeviceOn/iEdge is deployed to manage critical industrial assets. The lack of input sanitization suggests that attackers could craft payloads to manipulate device behavior or extract sensitive information from the dashboard interface, potentially undermining operational integrity.

Potential Impact

For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability could lead to unauthorized data manipulation and partial information disclosure. Such impacts may disrupt operational decision-making or expose sensitive configuration details to attackers. Since DeviceOn/iEdge is used to manage edge devices and IoT endpoints, exploitation could undermine the integrity of device management processes, potentially cascading into broader operational disruptions. The medium severity score reflects that while availability is not directly impacted, confidentiality and integrity breaches could facilitate further attacks or espionage. Organizations relying on Advantech solutions for industrial control systems (ICS) or IoT deployments in Europe must consider the risk of targeted attacks exploiting this vulnerability, especially given the strategic importance of industrial sectors in countries like Germany and France. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details become widely known.

Mitigation Recommendations

1. Implement strict input validation and sanitization on all user inputs, especially dashboard labels and path parameters, to prevent injection of malicious scripts. 2. Restrict access to the DeviceOn/iEdge dashboard to trusted networks and authenticated users with the minimum required privileges. 3. Monitor device logs and network traffic for unusual activity or error patterns that could indicate exploitation attempts. 4. Employ web application firewalls (WAFs) with rules targeting common XSS attack vectors to provide an additional layer of defense. 5. Coordinate with Advantech for timely patches or updates addressing this vulnerability once available. 6. Conduct regular security assessments and penetration testing focused on the management interfaces of industrial IoT platforms. 7. Segment industrial networks to isolate critical device management systems from general IT infrastructure, limiting attack surface. 8. Educate operational technology (OT) personnel about the risks of input-based attacks and the importance of secure configuration practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-05T16:45:22.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d258e790724a13ccd5552

Added to database: 11/6/2025, 10:47:42 PM

Last enriched: 11/6/2025, 10:50:59 PM

Last updated: 11/7/2025, 5:53:53 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats