CVE-2025-13651

N/A Unknown

📋 TL;DR

CVE-2025-13651 is an information disclosure vulnerability in Microcom ZeusWeb version 6.1.31 that allows unauthorized attackers to fingerprint the web application and potentially access sensitive system information. This affects organizations using the vulnerable version of ZeusWeb, exposing them to reconnaissance attacks that could facilitate further exploitation.

💻 Affected Systems

Products:
  • Microcom ZeusWeb
Versions: 6.1.31
Operating Systems: Any OS running ZeusWeb
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability appears to be present in default configurations of the affected version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the application's internal structure, identify backend technologies, discover hidden endpoints, and gather intelligence for targeted attacks like authentication bypass or data exfiltration.

🟠

Likely Case

Unauthorized actors will fingerprint the web application to identify software versions, exposed APIs, and configuration details that could be used for follow-up attacks.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to information gathering without direct access to sensitive data or systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Web application fingerprinting typically requires minimal technical skill and can be performed with common security tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.microcom360.com/servicio-zeus-web/

Restart Required: No

Instructions:

1. Contact Microcom support for patch availability. 2. Monitor vendor website for security updates. 3. Apply patch when available following vendor instructions.

🔧 Temporary Workarounds

Restrict Access with Firewall Rules

all

Limit access to ZeusWeb to trusted IP addresses only

Implement Web Application Firewall

all

Deploy WAF to filter fingerprinting attempts and obscure application details

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ZeusWeb from critical systems
  • Enable detailed logging and monitoring for unusual access patterns to ZeusWeb endpoints

🔍 How to Verify

Check if Vulnerable:

Check if ZeusWeb version 6.1.31 is installed by accessing the application and reviewing version information in interface or configuration files.

Check Version:

Check web interface or configuration files for version information; no standard command available.

Verify Fix Applied:

Verify version has been updated beyond 6.1.31 or test with web application fingerprinting tools to confirm information disclosure is prevented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual number of requests to application endpoints
  • Requests with fingerprinting tool user-agents
  • Access from unexpected IP addresses

Network Indicators:

  • HTTP requests probing for hidden files or directories
  • Patterns of requests to discover application structure
  • Tools like nmap, nikto, or dirb traffic

SIEM Query:

source="zeusweb" AND (http_user_agent CONTAINS "nikto" OR http_user_agent CONTAINS "dirb" OR http_user_agent CONTAINS "gobuster" OR http_user_agent CONTAINS "wfuzz")

🔗 References

📤 Share & Export