{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-48461","assignerOrgId":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","state":"PUBLISHED","assignerShortName":"CSA","dateReserved":"2025-05-22T09:41:25.401Z","datePublished":"2025-06-24T02:02:08.633Z","dateUpdated":"2025-06-25T13:23:33.993Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Advantech Wireless Sensing and Equipment (WISE)","vendor":"Advantech","versions":[{"status":"affected","version":"A2.01 B00"}]}],"credits":[{"lang":"en","type":"finder","value":"Joel Chang Zhi Kai"}],"datePublic":"2025-06-24T02:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords."}],"value":"Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"LOW","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","shortName":"CSA","dateUpdated":"2025-06-24T02:33:00.989Z"},"references":[{"url":"https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.\n\n<br>"}],"value":"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration."}],"source":{"discovery":"UNKNOWN"},"title":"Weak Session Cookie Entropy","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-341","lang":"en","description":"CWE-341 Predictable from Observable State"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-24T16:45:36.031567Z","id":"CVE-2025-48461","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-25T13:23:33.993Z"}}]}}