CVE-2025-64386: CWE-613 Insufficient Session Expiration in Circutor TCPRS1plus
The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.
AI Analysis
Technical Summary
CVE-2025-64386 is a vulnerability classified under CWE-1021, which pertains to improper restriction of rendered UI layers or frames, commonly known as clickjacking. The affected product is Circutor's TCPRS1plus, version 1.0.14, a web application likely used for energy management or monitoring. The vulnerability allows an attacker to embed the vulnerable web page within an iframe or similar HTML element on a malicious site. This embedding deceives users into interacting with the legitimate interface unknowingly, potentially causing them to perform unintended actions such as clicking buttons or submitting login credentials. The attack exploits the lack of proper frame-busting controls or HTTP headers like X-Frame-Options or Content Security Policy frame-ancestors directives that prevent the page from being framed. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality and integrity is low, as the attacker cannot directly access data but can trick users into disclosing credentials or triggering unauthorized commands. No patches or exploits are currently reported, but the vulnerability remains a risk, especially in environments where the product is deployed in critical systems. The vulnerability was published on October 31, 2025, and assigned by S21sec.
Potential Impact
For European organizations, especially those in the energy sector or critical infrastructure that use Circutor TCPRS1plus, this vulnerability poses a risk of social engineering attacks leading to unauthorized actions or credential compromise. Successful exploitation could allow attackers to gain access to user accounts or manipulate device settings indirectly, potentially disrupting monitoring or control functions. Although the direct technical impact is limited, the resulting unauthorized access could cascade into broader operational disruptions. The risk is heightened in environments where users have elevated privileges or where multi-factor authentication is not enforced. Additionally, compromised credentials could be leveraged for lateral movement within organizational networks. The medium severity reflects the need for attention but indicates that the vulnerability alone is unlikely to cause catastrophic failures without additional attacker capabilities or user mistakes.
Mitigation Recommendations
To mitigate CVE-2025-64386, organizations should implement several specific controls beyond generic advice. First, update the web application or apply vendor patches once available; if no patch exists, implement web server or reverse proxy configurations to add X-Frame-Options headers set to DENY or SAMEORIGIN, or Content Security Policy frame-ancestors directives restricting framing. Conduct a thorough review of the web application's UI to ensure no sensitive actions can be triggered without explicit user confirmation. Deploy browser security features and educate users to recognize suspicious framing or phishing attempts. Employ multi-factor authentication to reduce the impact of credential theft. Network segmentation should isolate the TCPRS1plus management interfaces from general user networks to limit exposure. Regularly monitor logs for unusual access patterns or repeated failed login attempts. Finally, consider using security tools that detect and block clickjacking attempts or frame injection attacks.
Affected Countries
Spain, Germany, France, Italy, Netherlands
CVE-2025-64386: CWE-613 Insufficient Session Expiration in Circutor TCPRS1plus
Description
The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.
AI-Powered Analysis
Technical Analysis
CVE-2025-64386 is a vulnerability classified under CWE-1021, which pertains to improper restriction of rendered UI layers or frames, commonly known as clickjacking. The affected product is Circutor's TCPRS1plus, version 1.0.14, a web application likely used for energy management or monitoring. The vulnerability allows an attacker to embed the vulnerable web page within an iframe or similar HTML element on a malicious site. This embedding deceives users into interacting with the legitimate interface unknowingly, potentially causing them to perform unintended actions such as clicking buttons or submitting login credentials. The attack exploits the lack of proper frame-busting controls or HTTP headers like X-Frame-Options or Content Security Policy frame-ancestors directives that prevent the page from being framed. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality and integrity is low, as the attacker cannot directly access data but can trick users into disclosing credentials or triggering unauthorized commands. No patches or exploits are currently reported, but the vulnerability remains a risk, especially in environments where the product is deployed in critical systems. The vulnerability was published on October 31, 2025, and assigned by S21sec.
Potential Impact
For European organizations, especially those in the energy sector or critical infrastructure that use Circutor TCPRS1plus, this vulnerability poses a risk of social engineering attacks leading to unauthorized actions or credential compromise. Successful exploitation could allow attackers to gain access to user accounts or manipulate device settings indirectly, potentially disrupting monitoring or control functions. Although the direct technical impact is limited, the resulting unauthorized access could cascade into broader operational disruptions. The risk is heightened in environments where users have elevated privileges or where multi-factor authentication is not enforced. Additionally, compromised credentials could be leveraged for lateral movement within organizational networks. The medium severity reflects the need for attention but indicates that the vulnerability alone is unlikely to cause catastrophic failures without additional attacker capabilities or user mistakes.
Mitigation Recommendations
To mitigate CVE-2025-64386, organizations should implement several specific controls beyond generic advice. First, update the web application or apply vendor patches once available; if no patch exists, implement web server or reverse proxy configurations to add X-Frame-Options headers set to DENY or SAMEORIGIN, or Content Security Policy frame-ancestors directives restricting framing. Conduct a thorough review of the web application's UI to ensure no sensitive actions can be triggered without explicit user confirmation. Deploy browser security features and educate users to recognize suspicious framing or phishing attempts. Employ multi-factor authentication to reduce the impact of credential theft. Network segmentation should isolate the TCPRS1plus management interfaces from general user networks to limit exposure. Regularly monitor logs for unusual access patterns or repeated failed login attempts. Finally, consider using security tools that detect and block clickjacking attempts or frame injection attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- S21sec
- Date Reserved
- 2025-10-31T13:13:35.299Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6904bf30f54b4a89977c5647
Added to database: 10/31/2025, 1:52:48 PM
Last enriched: 10/31/2025, 2:07:34 PM
Last updated: 11/2/2025, 2:50:50 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12603: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12602: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
HighCVE-2025-12599: CWE-321 Use of Hard-coded Cryptographic Key in Azure Access Technology BLU-IC2
CriticalCVE-2025-12601: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.