CVE-2025-36535

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in an embedded web server allows unauthenticated remote attackers to access the device without any authentication. This affects industrial control systems and IoT devices using vulnerable embedded web servers, particularly in operational technology environments where these devices are deployed.

💻 Affected Systems

Products:
  • AutomationDirect EKI-1221-CE Modbus Gateway
Versions: All versions prior to patched release
Operating Systems: Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the embedded web server interface of the Modbus gateway device. The vulnerability exists in the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including arbitrary code execution, configuration changes leading to operational disruption, and potential lateral movement within industrial networks.

🟠

Likely Case

Unauthorized configuration changes, operational disruption, and potential data exfiltration from exposed systems.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Directly exposed systems can be exploited by any internet-connected attacker without authentication.
🏢 Internal Only: HIGH - Even internally, lack of authentication allows any network user to access and potentially compromise the device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and can be exploited with simple HTTP requests to the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.automationdirect.com/adc/shopping/catalog/communications/protocol_gateways/modbus_gateways/eki-1221-ce

Restart Required: Yes

Instructions:

1. Check vendor advisory for latest firmware. 2. Download patched firmware from vendor site. 3. Upload firmware to device via web interface. 4. Apply firmware update. 5. Reboot device to complete installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable devices in separate network segments with strict firewall rules

Access Control Lists

all

Implement network ACLs to restrict access to device web interface

🧯 If You Can't Patch

  • Remove internet exposure and place behind firewall with strict access controls
  • Implement network monitoring and intrusion detection for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access the device web interface without authentication. If access is granted without login, the device is vulnerable.

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

After patching, attempt to access web interface without authentication. Access should be denied and require proper credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to web interface
  • Configuration changes without authentication logs

Network Indicators:

  • HTTP requests to device web interface without authentication headers
  • Unusual traffic patterns to industrial control devices

SIEM Query:

source="device_logs" AND (event="unauthenticated_access" OR event="configuration_change")

🔗 References

📤 Share & Export