CVE-2025-3498

9.9 CRITICAL

📋 TL;DR

An unauthenticated attacker with management network access can exploit exposed REST APIs on Radiflow iSAP Smart Collector devices to access all system settings, modify configurations, and execute commands like system reboots. This affects Radiflow iSAP Smart Collector running CentOS 7 with VSAP 1.20. Organizations using these devices in their management networks are vulnerable.

💻 Affected Systems

Products:
  • Radiflow iSAP Smart Collector
Versions: VSAP 1.20
Operating Systems: CentOS 7
Default Config Vulnerable: ⚠️ Yes
Notes: Requires management network access. Two web servers on TCP ports 8084 and 8086 expose unauthenticated REST APIs.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing configuration modification, command execution, and potential lateral movement within the management network.

🟠

Likely Case

Unauthorized configuration changes leading to service disruption, data exposure, or system reboots affecting operational continuity.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent management network access from untrusted sources.

🌐 Internet-Facing: LOW (assuming proper network segmentation, but HIGH if management interfaces are exposed to internet)
🏢 Internal Only: HIGH (management network access provides direct exploitation path)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct API calls to exposed endpoints without authentication required. CVSS 9.9 indicates critical severity with low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3498

Restart Required: No

Instructions:

1. Check Radiflow vendor website for security updates. 2. Apply any available patches. 3. Verify API endpoints are no longer accessible without authentication.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to management network interfaces (ports 8084, 8086) to authorized IPs only

iptables -A INPUT -p tcp --dport 8084 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 8086 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 8084 -j DROP
iptables -A INPUT -p tcp --dport 8086 -j DROP

Service Disablement

linux

Disable the vulnerable web services if not required

systemctl stop service_name
systemctl disable service_name

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management network from untrusted networks
  • Deploy network monitoring and intrusion detection for traffic to ports 8084/8086

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated API calls to http://device_ip:8084/ and http://device_ip:8086/ return configuration data or accept modifications

Check Version:

Check device web interface or SSH to device and run appropriate version command (vendor-specific)

Verify Fix Applied:

Verify that API endpoints now require authentication or return access denied for unauthenticated requests

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to ports 8084/8086
  • Configuration changes from unexpected sources
  • System reboot events without authorized triggers

Network Indicators:

  • Unusual traffic patterns to TCP ports 8084/8086 from unauthorized sources
  • API calls to management interfaces without authentication headers

SIEM Query:

source_port=8084 OR source_port=8086 AND (dest_ip=management_network AND NOT src_ip IN authorized_ips)

🔗 References

📤 Share & Export