CVE-2025-11789

7.5 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Circutor SGE-PLC1000/SGE-PLC50 allows attackers to read memory beyond intended boundaries by providing a large parameter to the 'DownloadFile' function. This affects industrial control systems using vulnerable versions of these PLC devices, potentially exposing sensitive data or causing system instability.

💻 Affected Systems

Products:
  • Circutor SGE-PLC1000
  • Circutor SGE-PLC50
Versions: v9.0.2
Operating Systems: Embedded/PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with the vulnerable firmware version exposed to network access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure could leak sensitive configuration data, authentication credentials, or system information, potentially enabling further attacks or causing denial of service through system crashes.

🟠

Likely Case

Information disclosure of adjacent memory contents, potentially revealing system state or configuration details that could aid attackers in reconnaissance or further exploitation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized access to the vulnerable interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the vulnerable function but appears straightforward based on the vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products-0

Restart Required: Yes

Instructions:

1. Monitor vendor for firmware updates. 2. Apply vendor-provided patches when available. 3. Restart affected devices after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLC devices from untrusted networks and restrict access to authorized management systems only.

Access Control Lists

all

Implement firewall rules to block external access to PLC management interfaces.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PLCs from untrusted networks
  • Monitor network traffic for unusual access patterns to PLC management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. If version is v9.0.2, device is vulnerable.

Check Version:

Check via web interface at http://[device-ip]/status or via serial console using vendor-specific commands

Verify Fix Applied:

Verify firmware version has been updated to a patched version provided by the vendor.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to DownloadFile function
  • Multiple failed parameter attempts
  • System crash or restart logs

Network Indicators:

  • Unusual traffic to PLC management ports
  • Requests with large numeric parameters to vulnerable endpoints

SIEM Query:

source_ip=external AND dest_port=PLC_management_port AND (uri_contains="DownloadFile" OR param_value>threshold)

🔗 References

📤 Share & Export