CVE-2025-28238

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to hijack active user sessions in Elber REBLE310 devices running firmware v5.5.1.R. Attackers can impersonate legitimate users and gain unauthorized access to device management functions. Organizations using the affected REBLE310/RX10/4ASI equipment models are at risk.

💻 Affected Systems

Products:
  • Elber REBLE310
  • Elber REBLE310/RX10/4ASI
Versions: Firmware v5.5.1.R
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version on the listed equipment models. Other versions may also be vulnerable but unconfirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of device management, allowing attackers to reconfigure critical industrial equipment, disrupt operations, or use the device as an entry point to internal networks.

🟠

Likely Case

Unauthorized access to device management interface leading to configuration changes, data exfiltration, or disruption of monitoring functions.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external attackers from reaching vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Session hijacking typically requires some initial access to capture session tokens, but the GitHub references suggest exploitation details are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check with Elber for firmware updates. If available, download the patched firmware and follow vendor instructions for updating the REBLE310 device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate REBLE310 devices from untrusted networks and restrict access to management interfaces.

Access Control Lists

all

Implement firewall rules to only allow trusted IP addresses to access the device management interface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices
  • Monitor network traffic to/from REBLE310 devices for suspicious session activity

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. If version is v5.5.1.R, the device is vulnerable.

Check Version:

Check via device web interface at http://[device-ip]/status or via serial console using vendor-specific commands

Verify Fix Applied:

Verify firmware version has been updated to a version later than v5.5.1.R.

📡 Detection & Monitoring

Log Indicators:

  • Multiple session IDs from same IP
  • Session ID reuse from different IPs
  • Unauthorized configuration changes

Network Indicators:

  • Unusual traffic patterns to device management port
  • Session token interception attempts

SIEM Query:

source_ip=[REBLE310_IP] AND (event_type="session_hijack" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export