CVE-2025-10653

8.6 HIGH

📋 TL;DR

CVE-2025-10653 exposes an unauthenticated debug port on affected devices, allowing attackers to access the device's file system without credentials. This affects Raise3D 3D printers and potentially other industrial control systems with similar debug configurations. Attackers can read, modify, or delete sensitive files through this exposed interface.

💻 Affected Systems

Products:
  • Raise3D 3D printers
  • Other industrial control systems with similar debug configurations
Versions: Specific versions not detailed in advisory; likely multiple versions prior to patching
Operating Systems: Embedded Linux systems, Industrial control system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with debug ports enabled by default or during development/testing phases are vulnerable. Production systems should have these disabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise including firmware modification, data theft, ransomware deployment, or physical damage to connected equipment through malicious file manipulation.

🟠

Likely Case

Unauthorized access to configuration files, intellectual property theft from stored print files, or disruption of printing operations through file deletion/modification.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to the debug port.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to the debug port but no authentication, making exploitation straightforward for attackers who can reach the service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://support.raise3d.com/

Restart Required: Yes

Instructions:

1. Check Raise3D support site for firmware updates. 2. Download latest firmware. 3. Apply update following vendor instructions. 4. Verify debug port is disabled post-update.

🔧 Temporary Workarounds

Disable Debug Port via Firewall

linux

Block access to the debug port using network firewall rules

iptables -A INPUT -p tcp --dport [DEBUG_PORT] -j DROP
ufw deny [DEBUG_PORT]/tcp

Network Segmentation

all

Isolate affected devices in separate network segments without internet access

🧯 If You Can't Patch

  • Implement strict network access controls to prevent external access to device debug ports
  • Monitor network traffic to debug ports and alert on any connection attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to connect to the debug port (typically TCP port 23, 2323, or vendor-specific) without authentication using telnet or nc

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

Verify debug port is no longer accessible and check firmware version matches patched release

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to debug ports
  • File system access logs showing unexpected reads/writes

Network Indicators:

  • TCP connections to debug ports from unauthorized IPs
  • Unusual file transfer patterns to/from device

SIEM Query:

source_ip=* AND dest_port IN (23, 2323, [DEBUG_PORT]) AND action=ALLOW

🔗 References

📤 Share & Export