CVE-2025-64305

6.5 MEDIUM

📋 TL;DR

MicroServer devices copy sensitive firmware data to an unencrypted SD card during boot, exposing user credentials and vendor secrets. Attackers can read these plaintext secrets to modify firmware or gain administrative access to the web interface. This affects MicroServer devices using external SD cards for boot operations.

💻 Affected Systems

Products:
  • MicroServer devices with external SD card boot capability
Versions: All versions prior to vendor patch
Operating Systems: Embedded firmware/RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires external SD card to be present during boot; devices without SD cards or with encrypted SD cards are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing firmware modification, persistent backdoor installation, and complete administrative control over the web portal and connected systems.

🟠

Likely Case

Unauthorized administrative access to the web portal leading to configuration changes, data theft, and potential lateral movement within the network.

🟢

If Mitigated

Limited exposure if SD card is physically secured or removed, though device remains vulnerable during boot sequence.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to SD card or ability to read it during boot process; no authentication needed to read exposed data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-006-01

Restart Required: No

Instructions:

1. Monitor vendor for firmware updates. 2. Apply vendor-provided patch when available. 3. Restart device after patching to ensure changes take effect.

🔧 Temporary Workarounds

Remove SD Card

all

Physically remove external SD card to prevent data exposure during boot

N/A - Physical action required

Encrypt SD Card

linux

Use full-disk encryption on SD card to protect data at rest

# Linux: cryptsetup luksFormat /dev/sdX
# Windows: Use BitLocker or similar

🧯 If You Can't Patch

  • Implement strict physical access controls to prevent unauthorized SD card access
  • Monitor for unauthorized SD card removal/insertion and alert on boot events

🔍 How to Verify

Check if Vulnerable:

Check if device has external SD card slot and boots with SD card inserted; examine SD card contents for firmware/secret files after boot.

Check Version:

Check device web interface or console for firmware version; vendor-specific command may vary.

Verify Fix Applied:

After vendor patch, verify SD card no longer contains plaintext firmware secrets or user credentials.

📡 Detection & Monitoring

Log Indicators:

  • Boot sequence logs showing SD card access
  • Unauthorized login attempts to web portal
  • Firmware modification alerts

Network Indicators:

  • Unexpected administrative access to web portal
  • Unusual firmware update traffic

SIEM Query:

source="microserver" AND (event="boot" OR event="sd_card_access") OR destination_port=80 AND user="admin" AND source_ip NOT IN allowed_ips

🔗 References

📤 Share & Export