CVE-2025-6519

9.8 CRITICAL

📋 TL;DR

CVE-2025-6519 allows attackers to predictably generate the password for the default 'ONEDAY' admin account in E3 Site Supervisor firmware, granting administrative access. This affects all systems running firmware versions below 2.31F01. The vulnerability cannot be mitigated by deleting or modifying the ONEDAY user.

💻 Affected Systems

Products:
  • E3 Site Supervisor
Versions: All firmware versions < 2.31F01
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The ONEDAY user is a default administrative account that cannot be deleted or modified by any user, making all default configurations vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise of the E3 Site Supervisor, allowing complete control over industrial control systems, potential disruption of critical infrastructure, and lateral movement to connected systems.

🟠

Likely Case

Unauthorized administrative access to the supervisory system, enabling configuration changes, data exfiltration, and potential manipulation of industrial processes.

🟢

If Mitigated

Limited impact if network segmentation prevents access to the vulnerable interface and strong authentication controls are in place elsewhere.

🌐 Internet-Facing: HIGH - If the management interface is exposed to the internet, attackers can remotely exploit this with predictable password generation.
🏢 Internal Only: HIGH - Even internally, any attacker with network access can exploit this vulnerability due to the predictable password generation mechanism.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the password generation algorithm, which has been publicly documented in the research. Attackers need network access to the management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.31F01

Vendor Advisory: https://www.armis.com/research/frostbyte10/

Restart Required: Yes

Instructions:

1. Download firmware version 2.31F01 from the vendor. 2. Backup current configuration. 3. Apply the firmware update through the management interface. 4. Verify the update completed successfully. 5. Restart the device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the E3 Site Supervisor management interface from untrusted networks

Access Control Lists

all

Implement strict network ACLs to limit access to the management interface to authorized IP addresses only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system from all untrusted networks
  • Deploy network monitoring and intrusion detection specifically for authentication attempts against the ONEDAY account

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the device web interface or CLI. If version is below 2.31F01, the system is vulnerable.

Check Version:

Check via web interface at System > About, or via CLI command 'show version'

Verify Fix Applied:

After patching, verify the firmware version shows 2.31F01 or higher and attempt to authenticate with the ONEDAY account using the old password generation method (should fail).

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts for ONEDAY user
  • Successful logins from unusual IP addresses to ONEDAY account
  • Configuration changes made by ONEDAY user

Network Indicators:

  • Authentication requests to the management interface for ONEDAY user
  • Traffic patterns indicating password guessing attempts

SIEM Query:

source="e3-supervisor" AND (user="ONEDAY" OR auth_failure="ONEDAY")

🔗 References

📤 Share & Export