CVE-2025-9994: CWE-306 Missing Authentication for Critical Function in Amped RF BT-AP 111
The Amp’ed RF BT-AP 111 Bluetooth access point's HTTP admin interface does not have an authentication feature, allowing unauthorized access to anyone with network access.
AI Analysis
Technical Summary
CVE-2025-9994 is a critical vulnerability affecting the Amped RF BT-AP 111 Bluetooth access point. The core issue is the absence of any authentication mechanism on the device's HTTP administrative interface. This means that anyone with network access to the device can connect to the admin interface without credentials and perform administrative functions. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-287 (Improper Authentication), indicating a fundamental security design flaw. The CVSS v3.1 score of 9.8 reflects the severity, with attack vector being network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). Because the HTTP admin interface controls critical device functions, unauthorized access could allow attackers to modify configurations, disrupt Bluetooth communications, or pivot into connected networks. The vulnerability affects all versions of the BT-AP 111 product line, and no patches or mitigations have been published yet. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make this a significant threat, especially in environments where these devices are deployed in sensitive or enterprise networks. The lack of authentication on an administrative interface exposed over the network is a severe security oversight, enabling attackers to fully compromise the device remotely without any barriers.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. The BT-AP 111 is used to extend Bluetooth connectivity, often in enterprise, industrial, or public environments. Unauthorized access to the admin interface could lead to disruption of Bluetooth services, potentially affecting operational technology, IoT devices, or user connectivity. Attackers could alter device configurations to intercept or manipulate Bluetooth traffic, leading to data breaches or espionage. Furthermore, compromised devices could serve as footholds for lateral movement within corporate networks, threatening broader IT infrastructure. Critical sectors such as manufacturing, healthcare, transportation, and public services that rely on Bluetooth-enabled devices are particularly at risk. The high CVSS score indicates that confidentiality, integrity, and availability of systems connected via these access points could be severely impacted. Given the device’s network exposure and lack of authentication, attackers do not require credentials or user interaction, increasing the likelihood of exploitation. This vulnerability could also undermine compliance with European data protection regulations like GDPR if personal data is intercepted or compromised.
Mitigation Recommendations
Immediate mitigation steps include isolating the BT-AP 111 devices from untrusted networks to limit exposure. Network segmentation should be enforced to restrict access to the device’s HTTP admin interface strictly to trusted administrators. Employing firewall rules or access control lists (ACLs) to block unauthorized IP addresses from reaching the device is critical. Since no official patch is available, organizations should consider disabling the HTTP admin interface if possible or replacing the affected devices with alternatives that enforce authentication. Monitoring network traffic for unusual access patterns to the device can help detect exploitation attempts early. Additionally, deploying network intrusion detection/prevention systems (IDS/IPS) with signatures targeting unauthorized access attempts to these devices can provide proactive defense. Organizations should also engage with Amped RF for updates or firmware patches and plan for rapid deployment once available. Documenting and auditing all Bluetooth access points and their configurations will aid in identifying vulnerable devices and prioritizing remediation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-9994: CWE-306 Missing Authentication for Critical Function in Amped RF BT-AP 111
Description
The Amp’ed RF BT-AP 111 Bluetooth access point's HTTP admin interface does not have an authentication feature, allowing unauthorized access to anyone with network access.
AI-Powered Analysis
Technical Analysis
CVE-2025-9994 is a critical vulnerability affecting the Amped RF BT-AP 111 Bluetooth access point. The core issue is the absence of any authentication mechanism on the device's HTTP administrative interface. This means that anyone with network access to the device can connect to the admin interface without credentials and perform administrative functions. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-287 (Improper Authentication), indicating a fundamental security design flaw. The CVSS v3.1 score of 9.8 reflects the severity, with attack vector being network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). Because the HTTP admin interface controls critical device functions, unauthorized access could allow attackers to modify configurations, disrupt Bluetooth communications, or pivot into connected networks. The vulnerability affects all versions of the BT-AP 111 product line, and no patches or mitigations have been published yet. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make this a significant threat, especially in environments where these devices are deployed in sensitive or enterprise networks. The lack of authentication on an administrative interface exposed over the network is a severe security oversight, enabling attackers to fully compromise the device remotely without any barriers.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. The BT-AP 111 is used to extend Bluetooth connectivity, often in enterprise, industrial, or public environments. Unauthorized access to the admin interface could lead to disruption of Bluetooth services, potentially affecting operational technology, IoT devices, or user connectivity. Attackers could alter device configurations to intercept or manipulate Bluetooth traffic, leading to data breaches or espionage. Furthermore, compromised devices could serve as footholds for lateral movement within corporate networks, threatening broader IT infrastructure. Critical sectors such as manufacturing, healthcare, transportation, and public services that rely on Bluetooth-enabled devices are particularly at risk. The high CVSS score indicates that confidentiality, integrity, and availability of systems connected via these access points could be severely impacted. Given the device’s network exposure and lack of authentication, attackers do not require credentials or user interaction, increasing the likelihood of exploitation. This vulnerability could also undermine compliance with European data protection regulations like GDPR if personal data is intercepted or compromised.
Mitigation Recommendations
Immediate mitigation steps include isolating the BT-AP 111 devices from untrusted networks to limit exposure. Network segmentation should be enforced to restrict access to the device’s HTTP admin interface strictly to trusted administrators. Employing firewall rules or access control lists (ACLs) to block unauthorized IP addresses from reaching the device is critical. Since no official patch is available, organizations should consider disabling the HTTP admin interface if possible or replacing the affected devices with alternatives that enforce authentication. Monitoring network traffic for unusual access patterns to the device can help detect exploitation attempts early. Additionally, deploying network intrusion detection/prevention systems (IDS/IPS) with signatures targeting unauthorized access attempts to these devices can provide proactive defense. Organizations should also engage with Amped RF for updates or firmware patches and plan for rapid deployment once available. Documenting and auditing all Bluetooth access points and their configurations will aid in identifying vulnerable devices and prioritizing remediation efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- certcc
- Date Reserved
- 2025-09-04T15:31:44.614Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c028f00b756cdd83640e36
Added to database: 9/9/2025, 1:17:36 PM
Last enriched: 9/17/2025, 1:10:28 AM
Last updated: 10/30/2025, 9:40:04 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62503: CWE-250: Execution with Unnecessary Privileges in Apache Software Foundation Apache Airflow
HighCVE-2025-62402: CWE-250: Execution with Unnecessary Privileges in Apache Software Foundation Apache Airflow
HighCVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.