CVE-2025-34263

5.4 MEDIUM

📋 TL;DR

Advantech WISE-DeviceOn Server versions before 5.4 contain a stored cross-site scripting vulnerability in the dashboard menu configuration endpoint. Authenticated attackers can inject malicious scripts that execute when other users view affected dashboards, potentially compromising sessions and performing unauthorized actions. This affects organizations using vulnerable versions of the WISE-DeviceOn Server for IoT device management.

💻 Affected Systems

Products:
  • Advantech WISE-DeviceOn Server
Versions: All versions prior to 5.4
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface; vulnerability exists in default dashboard configuration functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative privileges, compromises all connected IoT devices, steals sensitive data, and maintains persistent access to the entire infrastructure.

🟠

Likely Case

Attacker hijacks user sessions, performs unauthorized actions as authenticated users, and potentially accesses sensitive device management data.

🟢

If Mitigated

Limited to authenticated users only, with potential for session compromise but restricted by existing access controls and network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is obtained; stored XSS payloads persist until removed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4

Vendor Advisory: https://advcloudfiles.advantech.com/cms/2ca1b071-fd78-4d7f-8a2a-7b4537a95d19/Security%20Advisory%20PDF%20File/SECURITY-ADVISORY----DeviceOn-20251208-2.pdf

Restart Required: Yes

Instructions:

1. Download WISE-DeviceOn Server version 5.4 or later from Advantech's official website. 2. Backup current configuration and data. 3. Stop the WISE-DeviceOn Server service. 4. Install the updated version following vendor documentation. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or reverse proxy rules to sanitize input to the vulnerable endpoint

# WAF rule example: Block/alert on suspicious patterns in /rmm/v1/plugin-config/dashboards/menus requests

Access Restriction

all

Restrict access to the dashboard configuration functionality to only necessary administrative users

# Example: Implement additional authentication layer or IP restrictions for administrative functions

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Monitor and audit dashboard configuration changes for suspicious entries

🔍 How to Verify

Check if Vulnerable:

Check if version is below 5.4 via web interface admin panel or system information

Check Version:

Check web interface admin panel or consult vendor documentation for version checking

Verify Fix Applied:

Verify version is 5.4 or higher and test that script tags in dashboard menu fields are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /rmm/v1/plugin-config/dashboards/menus with script tags or JavaScript payloads
  • Multiple failed authentication attempts followed by successful login and dashboard configuration changes

Network Indicators:

  • HTTP requests containing script injection patterns to the vulnerable endpoint
  • Outbound connections from the server to unexpected external domains

SIEM Query:

source="wise-deviceon" AND (uri="/rmm/v1/plugin-config/dashboards/menus" AND (body="<script" OR body="javascript:" OR body="onerror=" OR body="onload="))

🔗 References

📤 Share & Export