CVE-2025-0630

6.5 MEDIUM

📋 TL;DR

This vulnerability allows any authenticated user on affected Western Telematic (WTI) products to perform local file inclusion attacks, potentially accessing sensitive files on the device's filesystem. The attack requires authentication but grants privileged access once authenticated. Organizations using WTI products with web interfaces are affected.

💻 Affected Systems

Products:
  • Western Telematic (WTI) products with web interfaces
Versions: Specific versions not detailed in advisory - check vendor advisory for exact affected versions
Operating Systems: Embedded systems/network device OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects products with web management interfaces. Authentication is required but any authenticated user can exploit this vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could read sensitive configuration files, credentials, or system files, potentially leading to complete device compromise and lateral movement within the network.

🟠

Likely Case

Authenticated users (including legitimate users with malicious intent) could access sensitive device configuration files and potentially extract credentials for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to the affected device only, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once authenticated. The CWE-73 (External Control of File Name or Path) suggests predictable file path manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-01

Restart Required: Yes

Instructions:

1. Review the CISA advisory for affected products. 2. Contact Western Telematic for specific patch information. 3. Apply vendor-provided firmware updates. 4. Restart affected devices after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from critical networks and limit access to management interfaces

Access Control Restrictions

all

Implement strict authentication controls and limit user privileges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Apply principle of least privilege to user accounts and monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisory. Test authenticated file inclusion attempts if authorized.

Check Version:

Check web interface system information page or use vendor-specific CLI commands

Verify Fix Applied:

Verify firmware version has been updated to patched version specified by vendor. Test that file inclusion attempts no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path access patterns in web server logs
  • Multiple failed file inclusion attempts
  • Access to sensitive system files via web interface

Network Indicators:

  • HTTP requests with file path traversal patterns
  • Unusual file downloads from management interface

SIEM Query:

web_access_logs WHERE (url CONTAINS '../' OR url CONTAINS 'file=') AND (src_ip = management_network)

🔗 References

📤 Share & Export