CVE-2022-25251

9.8 CRITICAL

📋 TL;DR

CVE-2022-25251 is an authentication bypass vulnerability in Axeda agent and Desktop Server for Windows that allows remote unauthenticated attackers to send XML messages to a specific port. This enables reading and modifying the product's configuration. All versions of these products are affected.

💻 Affected Systems

Products:
  • Axeda agent
  • Axeda Desktop Server for Windows
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the default installation configuration. The vulnerability exists in the XML message handling on a specific port.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control over affected systems, modifies configurations to enable persistent access, and potentially uses the system as a pivot point to attack other internal systems.

🟠

Likely Case

Remote attacker reads sensitive configuration data and modifies settings to disrupt operations or enable further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated systems with minimal business impact.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet without authentication on exposed systems.
🏢 Internal Only: HIGH - Even internally, this provides unauthenticated access to critical configuration data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending crafted XML messages to a specific port, which is straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to vendor advisory for specific patched versions

Vendor Advisory: https://www.ptc.com/en/support/article/CS363561

Restart Required: Yes

Instructions:

1. Review vendor advisory CS363561. 2. Download and apply the latest patch from PTC. 3. Restart affected services. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict access to the vulnerable port using firewall rules to only allow trusted sources.

Windows Firewall: New-NetFirewallRule -DisplayName "Block Axeda Port" -Direction Inbound -LocalPort [PORT_NUMBER] -Protocol TCP -Action Block

Disable Unnecessary Services

windows

Disable the Axeda agent service if not required for operations.

sc stop "AxedaAgent"
sc config "AxedaAgent" start= disabled

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to the vulnerable port only from trusted management systems.
  • Monitor network traffic to the vulnerable port for suspicious XML messages and implement intrusion detection rules.

🔍 How to Verify

Check if Vulnerable:

Check if Axeda agent or Desktop Server is running and listening on the vulnerable port using netstat: netstat -an | findstr [PORT_NUMBER]

Check Version:

Check installed version through Control Panel > Programs and Features or using wmic: wmic product where name="Axeda" get version

Verify Fix Applied:

Verify the patch version matches vendor recommendations and test that XML messages to the port no longer work without authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML message patterns to the Axeda port
  • Failed authentication attempts followed by successful configuration changes

Network Indicators:

  • XML traffic to the vulnerable port from unexpected sources
  • Unusual outbound connections from Axeda systems

SIEM Query:

source_port=[VULNERABLE_PORT] AND protocol=TCP AND (payload_contains="XML" OR payload_contains="configuration")

🔗 References

📤 Share & Export