CVE-2025-12515

9.8 CRITICAL

📋 TL;DR

This vulnerability in BLU-IC2 and BLU-IC4 devices allows attackers to trigger systemic internal server errors (HTTP 500 responses) that could potentially lead to denial of service or information disclosure. Organizations using affected versions of these industrial control devices are at risk. The high CVSS score indicates critical severity.

💻 Affected Systems

Products:
  • BLU-IC2
  • BLU-IC4
Versions: through 1.19.5
Operating Systems: Embedded/Industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations of these industrial control devices up to version 1.19.5

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability, potential information leakage through error messages, and possible foothold for further attacks on industrial control systems.

🟠

Likely Case

Service disruption and intermittent downtime affecting industrial operations, with potential exposure of system information through error responses.

🟢

If Mitigated

Minimal operational impact with proper network segmentation and monitoring, though some service degradation may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

HTTP 500 errors typically indicate unhandled exceptions that could be triggered by malformed requests

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.19.5

Vendor Advisory: https://azure-access.com/security-advisories

Restart Required: Yes

Instructions:

1. Check current version using device management interface
2. Download updated firmware from vendor portal
3. Backup current configuration
4. Apply firmware update
5. Restart device
6. Verify version is >1.19.5

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks

Rate Limiting

all

Implement request rate limiting to reduce attack surface

🧯 If You Can't Patch

  • Implement strict network access controls and firewall rules
  • Deploy WAF or reverse proxy with request filtering

🔍 How to Verify

Check if Vulnerable:

Check device version in management interface or via SNMP

Check Version:

snmpget -v2c -c public <device_ip> .1.3.6.1.4.1.12345.1.2.0

Verify Fix Applied:

Confirm version is >1.19.5 and monitor for HTTP 500 errors

📡 Detection & Monitoring

Log Indicators:

  • HTTP 500 response codes in web server logs
  • Exception stack traces in system logs

Network Indicators:

  • Unusual HTTP request patterns to device endpoints
  • Spike in error responses

SIEM Query:

source="device_logs" AND (status=500 OR message="Internal Server Error")

🔗 References

📤 Share & Export