Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64386: CWE-613 Insufficient Session Expiration in Circutor TCPRS1plus

0
High
VulnerabilityCVE-2025-64386cvecve-2025-64386cwe-613
Published: Fri Oct 31 2025 (10/31/2025, 13:42:32 UTC)
Source: CVE Database V5
Vendor/Project: Circutor
Product: TCPRS1plus

Description

The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.

AI-Powered Analysis

AILast updated: 10/31/2025, 14:07:34 UTC

Technical Analysis

CVE-2025-64386 is a vulnerability classified under CWE-1021, which pertains to improper restriction of rendered UI layers or frames, commonly known as clickjacking. The affected product is Circutor's TCPRS1plus, version 1.0.14, a web application likely used for energy management or monitoring. The vulnerability allows an attacker to embed the vulnerable web page within an iframe or similar HTML element on a malicious site. This embedding deceives users into interacting with the legitimate interface unknowingly, potentially causing them to perform unintended actions such as clicking buttons or submitting login credentials. The attack exploits the lack of proper frame-busting controls or HTTP headers like X-Frame-Options or Content Security Policy frame-ancestors directives that prevent the page from being framed. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality and integrity is low, as the attacker cannot directly access data but can trick users into disclosing credentials or triggering unauthorized commands. No patches or exploits are currently reported, but the vulnerability remains a risk, especially in environments where the product is deployed in critical systems. The vulnerability was published on October 31, 2025, and assigned by S21sec.

Potential Impact

For European organizations, especially those in the energy sector or critical infrastructure that use Circutor TCPRS1plus, this vulnerability poses a risk of social engineering attacks leading to unauthorized actions or credential compromise. Successful exploitation could allow attackers to gain access to user accounts or manipulate device settings indirectly, potentially disrupting monitoring or control functions. Although the direct technical impact is limited, the resulting unauthorized access could cascade into broader operational disruptions. The risk is heightened in environments where users have elevated privileges or where multi-factor authentication is not enforced. Additionally, compromised credentials could be leveraged for lateral movement within organizational networks. The medium severity reflects the need for attention but indicates that the vulnerability alone is unlikely to cause catastrophic failures without additional attacker capabilities or user mistakes.

Mitigation Recommendations

To mitigate CVE-2025-64386, organizations should implement several specific controls beyond generic advice. First, update the web application or apply vendor patches once available; if no patch exists, implement web server or reverse proxy configurations to add X-Frame-Options headers set to DENY or SAMEORIGIN, or Content Security Policy frame-ancestors directives restricting framing. Conduct a thorough review of the web application's UI to ensure no sensitive actions can be triggered without explicit user confirmation. Deploy browser security features and educate users to recognize suspicious framing or phishing attempts. Employ multi-factor authentication to reduce the impact of credential theft. Network segmentation should isolate the TCPRS1plus management interfaces from general user networks to limit exposure. Regularly monitor logs for unusual access patterns or repeated failed login attempts. Finally, consider using security tools that detect and block clickjacking attempts or frame injection attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2025-10-31T13:13:35.299Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6904bf30f54b4a89977c5647

Added to database: 10/31/2025, 1:52:48 PM

Last enriched: 10/31/2025, 2:07:34 PM

Last updated: 11/2/2025, 2:50:50 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats