CVE-2025-12363

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthorized disclosure of email passwords in BLU-IC2 and BLU-IC4 devices. Attackers can potentially access sensitive email credentials stored or transmitted by these systems. Organizations using affected versions of these products are at risk.

💻 Affected Systems

Products:
  • BLU-IC2
  • BLU-IC4
Versions: through 1.19.5
Operating Systems: Embedded systems running BLU-IC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using affected firmware versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of email accounts associated with the device, leading to data theft, credential reuse attacks, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized access to email credentials, potentially resulting in email account takeover, phishing campaigns, and information disclosure.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though credentials remain exposed to authorized users.

🌐 Internet-Facing: HIGH if devices are exposed to the internet, as attackers can remotely harvest credentials without authentication.
🏢 Internal Only: MEDIUM as internal attackers or compromised systems could still access exposed credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CWE-200 (Information Exposure) and high CVSS score, exploitation likely requires minimal technical skill once the vulnerability vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.19.5

Vendor Advisory: https://azure-access.com/security-advisories

Restart Required: Yes

Instructions:

1. Check current firmware version using device management interface. 2. Download firmware version newer than 1.19.5 from vendor portal. 3. Upload and apply firmware update through device management interface. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate BLU-IC devices from untrusted networks and limit access to authorized management systems only.

Credential Rotation

all

Change all email passwords configured on affected devices immediately.

🧯 If You Can't Patch

  • Implement strict network access controls to limit device exposure
  • Monitor device logs for unusual access patterns or credential extraction attempts

🔍 How to Verify

Check if Vulnerable:

Access device management interface and check firmware version. If version is 1.19.5 or earlier, device is vulnerable.

Check Version:

Device-specific command varies by interface. Typically accessible via web interface at device IP address.

Verify Fix Applied:

After patching, verify firmware version shows as newer than 1.19.5 in device management interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to email configuration endpoints
  • Multiple failed authentication attempts followed by successful access to email settings

Network Indicators:

  • Unexpected outbound connections from BLU-IC devices
  • Traffic patterns suggesting credential extraction

SIEM Query:

source_ip="BLU-IC_DEVICE_IP" AND (uri_path="/email/config" OR uri_path="/password" OR event_type="credential_access")

🔗 References

📤 Share & Export