CVE-2025-34265

5.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Advantech WISE-DeviceOn Server allows authenticated attackers to inject malicious scripts into rule engine fields. When other users view or interact with these rules, the scripts execute in their browser context, potentially compromising sessions and enabling unauthorized actions. Affected users include all authenticated users of vulnerable WISE-DeviceOn Server instances.

💻 Affected Systems

Products:
  • Advantech WISE-DeviceOn Server
Versions: All versions prior to 5.4
Operating Systems: Any OS running WISE-DeviceOn Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the /rmm/v1/rule-engines endpoint

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control by stealing session cookies, performing actions as any authenticated user, and potentially pivoting to other systems.

🟠

Likely Case

Session hijacking leading to unauthorized rule modifications, data exfiltration, and privilege escalation within the DeviceOn platform.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting specific rule viewing interfaces.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4

Vendor Advisory: https://advcloudfiles.advantech.com/cms/2ca1b071-fd78-4d7f-8a2a-7b4537a95d19/Security%20Advisory%20PDF%20File/SECURITY-ADVISORY----DeviceOn-20251208-2.pdf

Restart Required: Yes

Instructions:

1. Download WISE-DeviceOn Server version 5.4 or later from official Advantech sources. 2. Backup current configuration and data. 3. Stop the DeviceOn service. 4. Install the updated version. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Input Validation Web Application Firewall Rule

all

Block or sanitize requests containing script tags or JavaScript in min, max, and unit parameters

Restrict Access to Rule Engine Endpoint

all

Limit access to /rmm/v1/rule-engines endpoint to only necessary administrative users

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Enable strict input validation and output encoding for all user-controlled fields

🔍 How to Verify

Check if Vulnerable:

Check if version is below 5.4 and test if unsanitized HTML input in min/max/unit fields renders as HTML in rule views

Check Version:

Check DeviceOn web interface admin panel or server logs for version information

Verify Fix Applied:

After patching, verify version is 5.4+ and test that script tags in rule fields are properly escaped in output

📡 Detection & Monitoring

Log Indicators:

  • Unusual rule creation/modification patterns
  • Requests with script tags in min/max/unit parameters
  • Multiple failed authentication attempts followed by rule access

Network Indicators:

  • POST requests to /rmm/v1/rule-engines with JavaScript payloads
  • Unusual outbound connections from DeviceOn server

SIEM Query:

source="deviceon" AND (uri_path="/rmm/v1/rule-engines" AND (param="min" OR param="max" OR param="unit") AND (value CONTAINS "<script>" OR value CONTAINS "javascript:"))

🔗 References

📤 Share & Export