CVE-2025-13804

4.3 MEDIUM

📋 TL;DR

This CVE describes an information disclosure vulnerability in nutzam NutzBoot's Ethereum Wallet Handler component. Attackers can remotely exploit this flaw to access sensitive information from affected systems. Organizations using NutzBoot up to version 2.6.0-SNAPSHOT with the Ethereum Wallet Handler are at risk.

💻 Affected Systems

Products:
  • nutzam NutzBoot
Versions: Up to 2.6.0-SNAPSHOT
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the Ethereum Wallet Handler component (nutzboot-demo-simple-web3j module).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of sensitive Ethereum wallet data, private keys, transaction details, and potentially other application secrets stored in memory or accessible through the vulnerable component.

🟠

Likely Case

Disclosure of Ethereum wallet addresses, transaction metadata, and potentially some application configuration data that could facilitate further attacks.

🟢

If Mitigated

Limited exposure of non-critical information if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available in GitHub repositories, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: Yes

Instructions:

1. Monitor the official NutzBoot repository for security updates. 2. Upgrade to a version beyond 2.6.0-SNAPSHOT when available. 3. Test the update in a non-production environment first.

🔧 Temporary Workarounds

Disable Ethereum Wallet Handler

all

Remove or disable the vulnerable nutzboot-demo-simple-web3j module if not required for functionality.

Remove the nutzboot-demo-simple-web3j dependency from your pom.xml or build.gradle

Network Access Restriction

linux

Restrict network access to the affected service using firewall rules.

iptables -A INPUT -p tcp --dport [YOUR_PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [YOUR_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable service from untrusted networks.
  • Deploy a web application firewall (WAF) with rules to detect and block exploitation attempts targeting information disclosure patterns.

🔍 How to Verify

Check if Vulnerable:

Check if your application includes the nutzboot-demo-simple-web3j module and verify the NutzBoot version is ≤ 2.6.0-SNAPSHOT.

Check Version:

Check your pom.xml or build.gradle for nutzboot version, or run: java -jar your-app.jar --version (if supported)

Verify Fix Applied:

After applying workarounds, test that the Ethereum Wallet Handler endpoints no longer respond or return sensitive information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Ethereum-related endpoints
  • Error logs showing information disclosure attempts
  • Increased request volume to /eth or similar paths

Network Indicators:

  • Unusual outbound traffic containing wallet data or private information
  • Requests to Ethereum handler endpoints from unexpected sources

SIEM Query:

source="application.logs" AND (message="*EthModule*" OR message="*ethereum*" OR message="*wallet*") AND (message="*error*" OR message="*exception*")

🔗 References

📤 Share & Export