CVE-2025-70043

9.1 CRITICAL

📋 TL;DR

This vulnerability in Ayms node-To master branch disables TLS/SSL certificate validation, allowing man-in-the-middle attackers to intercept and manipulate encrypted communications. Any application using this library with default settings is vulnerable to credential theft and data interception.

💻 Affected Systems

Products:
  • Ayms node-To
Versions: master branch (specific version range not specified in CVE)
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the master branch where 'rejectUnauthorized': false is set in TLS socket options.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of encrypted communications, allowing attackers to steal authentication tokens, credentials, financial data, and inject malicious content into application traffic.

🟠

Likely Case

Credential harvesting and session hijacking for applications that transmit sensitive data over TLS connections.

🟢

If Mitigated

Limited impact if proper network segmentation and certificate pinning are implemented, though risk remains for exposed services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires man-in-the-middle position but is trivial once network access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/Ayms/node-To

Restart Required: Yes

Instructions:

1. Check the GitHub repository for updates. 2. Modify the source code to set 'rejectUnauthorized': true in TLS socket options. 3. Rebuild and redeploy the application.

🔧 Temporary Workarounds

Manual Code Fix

all

Modify the application code to enable certificate validation

Find and replace 'rejectUnauthorized': false with 'rejectUnauthorized': true in all TLS/SSL configuration sections

Environment Variable Override

all

Set NODE_TLS_REJECT_UNAUTHORIZED environment variable to enforce validation

export NODE_TLS_REJECT_UNAUTHORIZED=1
set NODE_TLS_REJECT_UNAUTHORIZED=1 (Windows)

🧯 If You Can't Patch

  • Implement strict network segmentation to limit exposure
  • Deploy certificate pinning at the application or network layer

🔍 How to Verify

Check if Vulnerable:

Search source code for 'rejectUnauthorized': false in TLS/SSL configuration files

Check Version:

Check package.json or repository commit history for node-To version

Verify Fix Applied:

Verify 'rejectUnauthorized': true is set and test TLS connections fail with invalid certificates

📡 Detection & Monitoring

Log Indicators:

  • TLS handshake failures with self-signed certificates
  • Unexpected certificate validation bypass logs

Network Indicators:

  • Unencrypted traffic where TLS expected
  • Successful connections with invalid certificates

SIEM Query:

source="application.logs" AND "rejectUnauthorized.*false" OR "certificate validation disabled"

🔗 References

📤 Share & Export