CVE-2025-45583

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in the FTP service of Audi UTR 2.0 Universal Traffic Recorder by using any username/password combination. This affects all systems running the vulnerable version of the traffic recorder software, potentially exposing sensitive traffic data.

💻 Affected Systems

Products:
  • Audi UTR 2.0 Universal Traffic Recorder
Versions: 2.0 (specific build numbers not specified in reference)
Operating Systems: Unknown - likely embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the FTP protocol implementation specifically. Systems with FTP service enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to the FTP service, allowing them to download all recorded traffic data, upload malicious files, modify existing recordings, or use the system as a foothold for further network attacks.

🟠

Likely Case

Unauthorized access to recorded traffic data, potentially exposing sensitive information about network communications, user activities, or proprietary data being transmitted.

🟢

If Mitigated

If proper network segmentation and access controls are in place, the impact is limited to the FTP service itself, though sensitive data could still be exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires only FTP client access and any credentials. No special tools or knowledge needed beyond basic FTP usage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check with Audi or the device manufacturer for security updates.

🔧 Temporary Workarounds

Disable FTP Service

all

Completely disable the FTP service if not required for operations

Specific commands depend on device configuration interface

Implement Network Access Controls

all

Restrict FTP access to specific trusted IP addresses only

Use firewall rules to block FTP (port 21) from untrusted networks

🧯 If You Can't Patch

  • Isolate the device on a separate VLAN with strict access controls
  • Monitor FTP authentication logs for suspicious activity and failed/successful login attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to authenticate to the FTP service using any random username/password combination. If authentication succeeds, the system is vulnerable.

Check Version:

Check device firmware/software version through device management interface

Verify Fix Applied:

After applying workarounds, test FTP authentication with invalid credentials - it should fail.

📡 Detection & Monitoring

Log Indicators:

  • Successful FTP logins with unusual usernames
  • Multiple FTP authentication attempts from single source
  • FTP access outside normal business hours

Network Indicators:

  • FTP traffic from unexpected source IPs
  • Unusual data transfer volumes via FTP

SIEM Query:

source="ftp.log" AND (event="login successful" OR event="authentication success") | stats count by src_ip, user

🔗 References

📤 Share & Export