CVE-2025-12114

5.5 MEDIUM

📋 TL;DR

This vulnerability in BLU-IC2 and BLU-IC4 devices allows information leakage through an enabled serial console, potentially exposing system details that could aid attackers in discovering additional vulnerabilities. It affects all versions up to 1.19.5 of these products. The risk is primarily to organizations using these specific industrial control devices.

💻 Affected Systems

Products:
  • BLU-IC2
  • BLU-IC4
Versions: through 1.19.5
Operating Systems: Embedded/Industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires serial console to be enabled and accessible to attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain detailed system information that enables them to discover and exploit additional vulnerabilities, potentially leading to full system compromise or disruption of industrial operations.

🟠

Likely Case

Information disclosure that reveals system architecture, software versions, or configuration details that could be used for targeted attacks.

🟢

If Mitigated

Limited information exposure with no direct system access or control.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical or network access to serial console interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.19.5

Vendor Advisory: https://azure-access.com/security-advisories

Restart Required: No

Instructions:

1. Check current version using device management interface. 2. If version is 1.19.5 or earlier, upgrade to latest version. 3. Verify serial console is disabled or properly secured.

🔧 Temporary Workarounds

Disable Serial Console

all

Disable the serial console interface to prevent information leakage.

Use device configuration interface to disable serial console access

Restrict Physical Access

all

Implement physical security controls to prevent unauthorized access to serial ports.

Implement physical security measures and access controls

🧯 If You Can't Patch

  • Implement strict physical security controls around devices
  • Monitor serial console access attempts and log all access

🔍 How to Verify

Check if Vulnerable:

Check device version via management interface - if version is 1.19.5 or earlier, device is vulnerable.

Check Version:

Use device-specific management commands to check firmware version

Verify Fix Applied:

Verify device version is greater than 1.19.5 and serial console is disabled or properly secured.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized serial console access attempts
  • Unexpected serial port activity

Network Indicators:

  • Serial-over-network connection attempts
  • Unexpected traffic to serial port interfaces

SIEM Query:

Search for serial console access events or version information disclosure in logs

🔗 References

📤 Share & Export