CVE-2025-5095

9.8 CRITICAL

📋 TL;DR

CVE-2025-5095 is an authentication bypass vulnerability in Burk Technology ARC Solo devices that allows unauthenticated attackers to change passwords via HTTP endpoints. This enables complete device takeover without valid credentials. All organizations using affected ARC Solo devices are vulnerable.

💻 Affected Systems

Products:
  • Burk Technology ARC Solo
Versions: All versions prior to patched release (specific version information not provided in references)
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: All ARC Solo devices with HTTP management interface enabled are vulnerable. The vulnerability exists in the password change mechanism specifically.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of ARC Solo device allowing attacker to modify configurations, disrupt broadcast operations, and use device as pivot point into broadcast network infrastructure.

🟠

Likely Case

Unauthorized password change leading to device takeover, potential broadcast signal manipulation, and denial of service to legitimate users.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to device management interfaces.

🌐 Internet-Facing: HIGH - Direct HTTP endpoint exposure allows remote exploitation without authentication.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be compromised without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to password change endpoint without authentication. No special tools or knowledge required beyond basic HTTP client usage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references - check vendor advisory

Vendor Advisory: https://www.burk.com/products/Broadcast/ARC-Solo-6

Restart Required: Yes

Instructions:

1. Contact Burk Technology for patch availability
2. Apply firmware update following vendor instructions
3. Restart device after update
4. Change all passwords after patching

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ARC Solo devices from untrusted networks and restrict access to management interfaces

Access Control Lists

all

Implement firewall rules to restrict HTTP access to ARC Solo management interface

🧯 If You Can't Patch

  • Disable HTTP management interface if possible and use alternative management methods
  • Place device behind VPN with strict authentication requirements for all access

🔍 How to Verify

Check if Vulnerable:

Test if password change HTTP endpoint accepts requests without authentication. Use curl or similar tool to attempt password change without credentials.

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

After patching, verify password change endpoint now requires proper authentication and session validation.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated HTTP POST requests to password change endpoints
  • Multiple failed authentication attempts followed by successful password change
  • Password change events from unexpected IP addresses

Network Indicators:

  • HTTP traffic to ARC Solo management interface from unauthorized sources
  • Unusual patterns of password change requests

SIEM Query:

source="arc-solo-logs" AND (url_path="/password/change" OR url_path="/changepassword") AND auth_status="failed"

🔗 References

📤 Share & Export