CVE-2025-64386: CWE-613 Insufficient Session Expiration in Circutor TCPRS1plus
The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.
AI Analysis
Technical Summary
CVE-2025-64386 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting Circutor's TCPRS1plus device, specifically version 1.0.14. The device uses JSON Web Tokens (JWT) to manage session authentication for its web server interface. However, the session management implementation is flawed: the server allows reuse of previously issued JWT tokens even while a legitimate session is active. This means that if an attacker obtains a valid JWT token—potentially through interception or other means—they can hijack the session without the legitimate user being aware. The attacker can then modify security-related parameters or access sensitive functions on the device. The vulnerability has a CVSS 4.0 base score of 7.7, indicating high severity. The vector metrics show the attack is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no authentication (AT:N), but requires user interaction (UI:P). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H). No patches or exploits are currently publicly available, but the risk remains significant due to the critical nature of the device's role in energy management and industrial environments. The root cause is the failure to properly expire or revoke JWT tokens, allowing session fixation or replay attacks. This undermines the trust model of the authentication mechanism and can lead to unauthorized control or data manipulation.
Potential Impact
For European organizations, especially those involved in energy management, industrial automation, or critical infrastructure, this vulnerability poses a substantial risk. Unauthorized session hijacking can lead to unauthorized changes in device configuration, disruption of energy monitoring or control functions, and potential data breaches. This can compromise operational integrity and availability, potentially causing service outages or safety hazards. The ability to modify security parameters without detection increases the risk of persistent unauthorized access and lateral movement within networks. Given the strategic importance of energy infrastructure in Europe, exploitation could have cascading effects on national grids or industrial processes. The lack of authentication requirements and the network attack vector make it easier for remote attackers to exploit the vulnerability if they can obtain or intercept a token. Although no known exploits are reported, the high impact and ease of exploitation warrant immediate attention to prevent future attacks.
Mitigation Recommendations
1. Circutor should release a firmware update that enforces strict session expiration policies, ensuring JWT tokens are invalidated immediately upon session termination or after a short timeout period. 2. Implement token revocation mechanisms to invalidate tokens once a new session is established or upon logout. 3. Employ secure transmission protocols (e.g., TLS) to protect JWT tokens from interception. 4. Monitor web server logs and network traffic for signs of token reuse or anomalous session activity indicative of hijacking attempts. 5. Segment the network to isolate TCPRS1plus devices from general user networks, limiting exposure to potential attackers. 6. Use multi-factor authentication if supported to reduce reliance on JWT tokens alone. 7. Educate users about phishing and social engineering risks that could lead to token theft. 8. If immediate patching is not possible, consider disabling remote web access or restricting it via VPN or IP whitelisting. 9. Conduct regular security audits and penetration tests focusing on session management controls. 10. Collaborate with Circutor support to obtain guidance on interim mitigations and updates.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-64386: CWE-613 Insufficient Session Expiration in Circutor TCPRS1plus
Description
The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.
AI-Powered Analysis
Technical Analysis
CVE-2025-64386 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting Circutor's TCPRS1plus device, specifically version 1.0.14. The device uses JSON Web Tokens (JWT) to manage session authentication for its web server interface. However, the session management implementation is flawed: the server allows reuse of previously issued JWT tokens even while a legitimate session is active. This means that if an attacker obtains a valid JWT token—potentially through interception or other means—they can hijack the session without the legitimate user being aware. The attacker can then modify security-related parameters or access sensitive functions on the device. The vulnerability has a CVSS 4.0 base score of 7.7, indicating high severity. The vector metrics show the attack is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no authentication (AT:N), but requires user interaction (UI:P). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H). No patches or exploits are currently publicly available, but the risk remains significant due to the critical nature of the device's role in energy management and industrial environments. The root cause is the failure to properly expire or revoke JWT tokens, allowing session fixation or replay attacks. This undermines the trust model of the authentication mechanism and can lead to unauthorized control or data manipulation.
Potential Impact
For European organizations, especially those involved in energy management, industrial automation, or critical infrastructure, this vulnerability poses a substantial risk. Unauthorized session hijacking can lead to unauthorized changes in device configuration, disruption of energy monitoring or control functions, and potential data breaches. This can compromise operational integrity and availability, potentially causing service outages or safety hazards. The ability to modify security parameters without detection increases the risk of persistent unauthorized access and lateral movement within networks. Given the strategic importance of energy infrastructure in Europe, exploitation could have cascading effects on national grids or industrial processes. The lack of authentication requirements and the network attack vector make it easier for remote attackers to exploit the vulnerability if they can obtain or intercept a token. Although no known exploits are reported, the high impact and ease of exploitation warrant immediate attention to prevent future attacks.
Mitigation Recommendations
1. Circutor should release a firmware update that enforces strict session expiration policies, ensuring JWT tokens are invalidated immediately upon session termination or after a short timeout period. 2. Implement token revocation mechanisms to invalidate tokens once a new session is established or upon logout. 3. Employ secure transmission protocols (e.g., TLS) to protect JWT tokens from interception. 4. Monitor web server logs and network traffic for signs of token reuse or anomalous session activity indicative of hijacking attempts. 5. Segment the network to isolate TCPRS1plus devices from general user networks, limiting exposure to potential attackers. 6. Use multi-factor authentication if supported to reduce reliance on JWT tokens alone. 7. Educate users about phishing and social engineering risks that could lead to token theft. 8. If immediate patching is not possible, consider disabling remote web access or restricting it via VPN or IP whitelisting. 9. Conduct regular security audits and penetration tests focusing on session management controls. 10. Collaborate with Circutor support to obtain guidance on interim mitigations and updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- S21sec
- Date Reserved
- 2025-10-31T13:13:35.299Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6904bf30f54b4a89977c5647
Added to database: 10/31/2025, 1:52:48 PM
Last enriched: 11/8/2025, 2:35:49 AM
Last updated: 12/15/2025, 6:30:02 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14707: Command Injection in Shiguangwu sgwbox N3
CriticalCVE-2025-13355: CWE-79 Cross-Site Scripting (XSS) in URL Shortify
UnknownCVE-2025-12684: CWE-79 Cross-Site Scripting (XSS) in URL Shortify
UnknownCVE-2025-11363: CWE-434 Unrestricted Upload of File with Dangerous Type in Royal Addons for Elementor
UnknownCVE-2025-14712: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in JHENG GAO Student Learning Assessment and Support System
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.