CVE-2025-24850

5.3 MEDIUM

📋 TL;DR

This vulnerability allows an attacker to export other users' plant information from affected systems, potentially exposing sensitive operational data. It affects users of specific industrial control systems where proper authorization checks are missing for export functionality.

💻 Affected Systems

Products:
  • Specific industrial control systems mentioned in CISA advisory ICSA-25-105-04
Versions: Versions prior to the patched version specified in vendor advisory
Operating Systems: Not specified - likely embedded/industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the vulnerable export functionality enabled. Check vendor advisory for specific product names.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all plant information across the system, including sensitive operational data, configuration details, and potentially proprietary information that could be used for further attacks.

🟠

Likely Case

Unauthorized access to plant information belonging to other users, leading to data leakage and potential privacy violations.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place, though some information exposure may still occur.

🌐 Internet-Facing: MEDIUM - If the system is internet-facing, attackers could exploit this remotely, but exploitation requires some level of access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to access other users' data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation likely requires some level of access to the system, but the vulnerability itself is straightforward (CWE-639: Authorization Bypass Through User-Controlled Key).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: Refer to CISA advisory ICSA-25-105-04 for vendor links

Restart Required: Yes

Instructions:

1. Identify affected systems and versions
2. Obtain vendor patch from official sources
3. Apply patch following vendor instructions
4. Restart affected systems
5. Verify patch application

🔧 Temporary Workarounds

Disable export functionality

all

Temporarily disable plant information export features until patching can be completed

Check vendor documentation for disable commands

Implement network segmentation

all

Restrict access to affected systems to authorized users only

🧯 If You Can't Patch

  • Implement strict access controls and monitor export functionality usage
  • Deploy network monitoring to detect unauthorized export attempts

🔍 How to Verify

Check if Vulnerable:

Check system version against vendor advisory and test export functionality with different user accounts

Check Version:

Check vendor documentation for version check command specific to the affected product

Verify Fix Applied:

Verify patch version is installed and test that users can only export their own plant information

📡 Detection & Monitoring

Log Indicators:

  • Multiple export requests from single user
  • Export requests for plant IDs not owned by requesting user
  • Unusual export patterns or volumes

Network Indicators:

  • Unusual data export traffic patterns
  • Export requests to unexpected destinations

SIEM Query:

source="affected_system" AND (event="export" OR event="data_download") AND user!=plant_owner

🔗 References

📤 Share & Export