CVE-2025-70045

7.4 HIGH

📋 TL;DR

This vulnerability allows man-in-the-middle attacks by disabling TLS/SSL certificate validation in jxcore jxm master. When 'jx_obj.IsSecure' is true, the application sets 'rejectUnauthorized': false in HTTPS requests, making encrypted connections vulnerable to interception. This affects all users of vulnerable jxcore jxm master installations.

💻 Affected Systems

Products:
  • jxcore jxm master
Versions: All versions prior to fix
Operating Systems: All platforms running jxcore
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when 'jx_obj.IsSecure' is true, which appears to be a configuration or code path condition.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can intercept, decrypt, and modify all HTTPS traffic between the application and external services, potentially stealing sensitive data, credentials, or injecting malicious content.

🟠

Likely Case

Man-in-the-middle attackers can eavesdrop on encrypted communications and potentially steal authentication tokens, API keys, or other sensitive information transmitted over HTTPS.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential data leakage from the specific vulnerable application component.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with man-in-the-middle positioning. The GitHub gist provides technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/jxcore/jxm

Restart Required: Yes

Instructions:

1. Monitor jxcore/jxm GitHub repository for security updates. 2. Apply patch when available. 3. Restart affected services.

🔧 Temporary Workarounds

Code modification to enforce certificate validation

all

Manually modify the application code to remove or override the 'rejectUnauthorized': false setting

# Requires code review and modification of jxcore jxm master source code

Network-level certificate validation

all

Implement SSL/TLS inspection at network perimeter to enforce certificate validation

# Configure firewall/proxy with SSL inspection and certificate validation

🧯 If You Can't Patch

  • Isolate vulnerable systems in restricted network segments with no internet access
  • Monitor all outbound HTTPS traffic from affected systems for anomalies

🔍 How to Verify

Check if Vulnerable:

Review application code for 'rejectUnauthorized': false in HTTPS request options when 'jx_obj.IsSecure' is true

Check Version:

# Check jxcore version: jx --version

Verify Fix Applied:

Verify code no longer contains 'rejectUnauthorized': false or it's set to true in all HTTPS configurations

📡 Detection & Monitoring

Log Indicators:

  • HTTPS connection failures due to certificate validation
  • Unusual outbound HTTPS connections

Network Indicators:

  • HTTPS traffic to unexpected destinations
  • SSL/TLS handshakes without proper certificate validation

SIEM Query:

source="network_traffic" dest_port=443 ssl_validation="failed" OR ssl_validation="disabled"

🔗 References

📤 Share & Export