Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64302: CWE-79 in Advantech DeviceOn/iEdge

0
Medium
VulnerabilityCVE-2025-64302cvecve-2025-64302cwe-79
Published: Thu Nov 06 2025 (11/06/2025, 22:24:15 UTC)
Source: CVE Database V5
Vendor/Project: Advantech
Product: DeviceOn/iEdge

Description

Insufficient input sanitization in the dashboard label or path can allow an attacker to trigger a device error causing information disclosure or data manipulation.

AI-Powered Analysis

AILast updated: 11/14/2025, 02:29:59 UTC

Technical Analysis

CVE-2025-64302 is a vulnerability classified under CWE-79 (Cross-Site Scripting) affecting Advantech's DeviceOn/iEdge platform. The root cause is insufficient sanitization of user-supplied input in dashboard labels or path parameters. This flaw allows an attacker to inject malicious scripts that can cause device errors, leading to potential information disclosure or unauthorized data manipulation. The vulnerability can be exploited remotely over the network with low attack complexity and requires only low-level privileges, without any user interaction. The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS v3.1 base score is 6.4, reflecting a medium severity level. No patches or known exploits are currently reported, but the vulnerability's presence in industrial IoT management software raises concerns due to the critical nature of such environments. The vulnerability's scope is broad since it affects all versions of DeviceOn/iEdge identified as '0' in the affected versions field, indicating possibly all current versions. This vulnerability could be leveraged to gain unauthorized insights into device configurations or manipulate dashboard data, potentially disrupting operational monitoring or control processes.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, or critical infrastructure sectors, this vulnerability poses a risk to the confidentiality and integrity of device management data. Exploitation could lead to unauthorized disclosure of sensitive operational information or manipulation of device settings, which may degrade trust in monitoring systems or cause incorrect operational decisions. Given the reliance on Advantech DeviceOn/iEdge in industrial IoT deployments, the impact could extend to production efficiency and safety. While availability is not directly affected, the indirect consequences of data manipulation could lead to operational disruptions. The risk is heightened in environments where the management interface is exposed to less trusted networks or where privilege separation is weak. European organizations with regulatory obligations around data protection and operational security may face compliance risks if this vulnerability is exploited.

Mitigation Recommendations

1. Implement strict input validation and sanitization on all dashboard label and path inputs to prevent script injection. 2. Restrict network access to the DeviceOn/iEdge management interfaces using firewalls, VPNs, or network segmentation to limit exposure. 3. Enforce the principle of least privilege for users accessing the platform, ensuring only authorized personnel have low-level privileges. 4. Monitor logs and network traffic for unusual or malformed input patterns targeting dashboard parameters. 5. Apply vendor patches or updates promptly once available; engage with Advantech support for timelines and interim mitigations. 6. Conduct regular security assessments and penetration tests focusing on web interface vulnerabilities. 7. Educate operational technology (OT) and IT teams about the risks of input validation flaws and the importance of secure configuration. 8. Consider deploying Web Application Firewalls (WAF) capable of detecting and blocking XSS attempts targeting the platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-05T16:45:22.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d258e790724a13ccd5552

Added to database: 11/6/2025, 10:47:42 PM

Last enriched: 11/14/2025, 2:29:59 AM

Last updated: 12/20/2025, 5:49:37 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats