Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64389: CWE-319 Cleartext Transmission of Sensitive Information in Circutor TCPRS1plus

0
High
VulnerabilityCVE-2025-64389cvecve-2025-64389cwe-319
Published: Fri Oct 31 2025 (10/31/2025, 14:19:48 UTC)
Source: CVE Database V5
Vendor/Project: Circutor
Product: TCPRS1plus

Description

The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol.

AI-Powered Analysis

AILast updated: 10/31/2025, 14:52:32 UTC

Technical Analysis

CVE-2025-64389 identifies a vulnerability in the Circutor TCPRS1plus device, specifically version 1.0.14, where the embedded web server transmits sensitive information in cleartext over an insecure protocol. This corresponds to CWE-319, which involves the cleartext transmission of sensitive data, exposing it to interception by attackers capable of network sniffing. The vulnerability has a CVSS 4.0 base score of 8.3, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:A). The vulnerability impacts confidentiality greatly (VC:H), with no impact on integrity or availability. The scope is limited to the vulnerable component (SI:L), and the security requirements for confidentiality are high (SC:N), integrity none (SI:L), and availability high (SA:H). The lack of encryption means that sensitive data such as credentials, configuration details, or operational data can be intercepted by attackers on the same network or via man-in-the-middle attacks. This vulnerability is particularly concerning for industrial environments where TCPRS1plus devices are used for power monitoring and control, as exposure of sensitive data can lead to further attacks or operational disruptions. No patches or exploits are currently reported, but the vulnerability's characteristics suggest it could be exploited with relative ease by attackers with network access and some user interaction, such as clicking a malicious link or visiting a compromised site that triggers the vulnerable communication. The vulnerability highlights the critical need for secure communication protocols like HTTPS or encrypted tunnels in industrial IoT and control devices.

Potential Impact

For European organizations, especially those in industrial, energy, and infrastructure sectors, this vulnerability poses a significant risk to the confidentiality of operational data and credentials. Interception of sensitive information could lead to unauthorized access, espionage, or preparation for more sophisticated attacks such as device manipulation or sabotage. Given the critical role of Circutor TCPRS1plus in power monitoring and management, exposure of data could disrupt energy management systems, potentially affecting operational efficiency and safety. The vulnerability's exploitation could also undermine trust in industrial control systems and lead to regulatory and compliance issues under frameworks like GDPR if personal or sensitive data is involved. The requirement for user interaction slightly limits exploitation but does not eliminate risk, especially in environments where users may be targeted with social engineering. The absence of known exploits in the wild provides a window for mitigation but also means organizations should proactively address the issue before attackers develop weaponized exploits.

Mitigation Recommendations

Organizations should immediately identify all Circutor TCPRS1plus devices running version 1.0.14 and assess their network exposure. Since no patches are currently available, mitigation should focus on network-level controls: isolate affected devices on dedicated VLANs with strict access controls, enforce network segmentation to limit exposure to untrusted networks, and deploy encrypted tunnels (e.g., VPNs) for remote access. Disable any unnecessary web server interfaces or services on the devices to reduce attack surface. Implement strict monitoring and logging of network traffic to detect unusual patterns indicative of interception or man-in-the-middle attacks. Educate users about the risks of interacting with unknown links or sites that could trigger the vulnerability. Engage with Circutor for updates on patches or firmware upgrades and plan for timely deployment once available. Consider deploying network intrusion detection systems (NIDS) capable of identifying cleartext sensitive data transmissions. Finally, review and enhance overall industrial cybersecurity policies to include secure communication protocols for all critical devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2025-10-31T13:13:35.299Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6904c9ac8ec00889be37f503

Added to database: 10/31/2025, 2:37:32 PM

Last enriched: 10/31/2025, 2:52:32 PM

Last updated: 10/31/2025, 7:40:18 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats