CVE-2025-14466

5.3 MEDIUM

📋 TL;DR

An unauthenticated attacker can send specially-crafted HTTP requests to the web interface of Güralp Fortimus, Minimus, and Certimus series devices, causing the web service to restart and creating a brief denial-of-service condition. This affects organizations using these industrial control system devices with network-accessible web interfaces.

💻 Affected Systems

Products:
  • Güralp Fortimus Series
  • Güralp Minimus Series
  • Güralp Certimus Series
Versions: All versions prior to patched versions
Operating Systems: Embedded/ICS-specific OS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with web interface enabled and network accessible are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Repeated exploitation could cause sustained service disruption by continuously restarting the web service, potentially affecting monitoring and control capabilities.

🟠

Likely Case

Brief service interruption during web service restart, temporarily preventing access to the web interface.

🟢

If Mitigated

Minimal impact if devices are properly segmented and access controlled, with only brief service restarts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires network access to web interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific versions

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-350-01

Restart Required: Yes

Instructions:

1. Review CISA advisory ICSA-25-350-01
2. Contact Güralp Systems for firmware updates
3. Apply firmware updates following vendor instructions
4. Restart affected devices

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks

Access Control

all

Restrict network access to web interface using firewalls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate devices
  • Monitor for unusual HTTP requests to device web interfaces

🔍 How to Verify

Check if Vulnerable:

Check if device is in affected product list and has web interface accessible

Check Version:

Check device web interface or console for firmware version

Verify Fix Applied:

Verify firmware version matches patched version from vendor

📡 Detection & Monitoring

Log Indicators:

  • Web service restart events
  • Unusual HTTP request patterns

Network Indicators:

  • HTTP requests causing service restarts
  • Repeated connection attempts to web interface

SIEM Query:

Search for web service restart events on Güralp devices

🔗 References

📤 Share & Export