{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-48462","assignerOrgId":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","state":"PUBLISHED","assignerShortName":"CSA","dateReserved":"2025-05-22T09:41:25.401Z","datePublished":"2025-06-24T02:08:58.607Z","dateUpdated":"2025-06-25T13:25:06.014Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Advantech Wireless Sensing and Equipment (WISE)","vendor":"Advantech","versions":[{"status":"affected","version":"A2.01 B00"}]}],"credits":[{"lang":"en","type":"finder","value":"Marc Heuse"}],"datePublic":"2025-06-24T02:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Successful exploitation of the vulnerability could allow an attacker to consume all available session slots and block other users from logging in, thereby preventing legitimate users from gaining access to the product."}],"value":"Successful exploitation of the vulnerability could allow an attacker to consume all available session slots and block other users from logging in, thereby preventing legitimate users from gaining access to the product."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":4.2,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","shortName":"CSA","dateUpdated":"2025-06-24T02:46:38.973Z"},"references":[{"url":"https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.\n\n<br>"}],"value":"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration."}],"source":{"discovery":"UNKNOWN"},"title":"Login Session Exhaustion","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-770","lang":"en","description":"CWE-770 Allocation of Resources Without Limits or Throttling"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-24T16:42:45.283647Z","id":"CVE-2025-48462","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-25T13:25:06.014Z"}}]}}