CVE-2025-34266

5.4 MEDIUM

📋 TL;DR

This is an authenticated stored cross-site scripting (XSS) vulnerability in Advantech WISE-DeviceOn Server. An authenticated attacker can inject malicious scripts into AddIns menu entries, which execute in victims' browsers when they view or interact with those entries. This affects users of WISE-DeviceOn Server versions prior to 5.4.

💻 Affected Systems

Products:
  • Advantech WISE-DeviceOn Server
Versions: All versions prior to 5.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the DeviceOn Server web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control, steals session tokens, performs unauthorized actions as victims, and potentially compromises the entire DeviceOn Server environment.

🟠

Likely Case

Session hijacking, credential theft, unauthorized configuration changes, and lateral movement within the DeviceOn Server environment.

🟢

If Mitigated

Limited to authenticated users only, with potential for privilege escalation if lower-privileged users can exploit against administrators.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in a standard web interface component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4 or later

Vendor Advisory: https://advcloudfiles.advantech.com/cms/2ca1b071-fd78-4d7f-8a2a-7b4537a95d19/Security%20Advisory%20PDF%20File/SECURITY-ADVISORY----DeviceOn-20251208-2.pdf

Restart Required: Yes

Instructions:

1. Download WISE-DeviceOn Server version 5.4 or later from Advantech's official website. 2. Backup current configuration and data. 3. Stop the DeviceOn Server service. 4. Install the updated version. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Input Validation via Web Application Firewall

all

Configure WAF rules to block XSS payloads targeting the /rmm/v1/plugin-config/addins/menus endpoint

Restrict AddIns Menu Access

all

Limit which users can add or edit AddIns menu entries to trusted administrators only

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources
  • Monitor and audit all AddIns menu configuration changes for suspicious content

🔍 How to Verify

Check if Vulnerable:

Check if your WISE-DeviceOn Server version is below 5.4 in the web interface or via system information commands

Check Version:

Check the web interface admin panel or consult system documentation for version verification commands

Verify Fix Applied:

After upgrading to version 5.4 or later, verify the version number and test that HTML/script input in AddIns menu fields is properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual AddIns menu configuration changes
  • Multiple failed authentication attempts followed by successful login and menu modifications
  • Suspicious strings containing script tags or JavaScript in configuration logs

Network Indicators:

  • HTTP POST requests to /rmm/v1/plugin-config/addins/menus containing script payloads
  • Unusual outbound connections from DeviceOn Server to external domains

SIEM Query:

source="deviceon-logs" AND (uri_path="/rmm/v1/plugin-config/addins/menus" AND (body CONTAINS "<script>" OR body CONTAINS "javascript:"))

🔗 References

📤 Share & Export