Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP communication, potentially leading to unauthorised access or data tampering.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18987 Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP communication, potentially leading to unauthorised access or data tampering.
Fixes

Solution

This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 6e-05}

epss

{'score': 7e-05}


Wed, 09 Jul 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Advantech
Advantech wise-4010lan
Advantech wise-4010lan Firmware
Advantech wise-4050lan
Advantech wise-4050lan Firmware
Advantech wise-4060lan
Advantech wise-4060lan Firmware
CPEs cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*
cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*
cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*
cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*
Vendors & Products Advantech
Advantech wise-4010lan
Advantech wise-4010lan Firmware
Advantech wise-4050lan
Advantech wise-4050lan Firmware
Advantech wise-4060lan
Advantech wise-4060lan Firmware

Wed, 25 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-312

Tue, 24 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Tue, 24 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
Description Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP communication, potentially leading to unauthorised access or data tampering.
Title Unencrypted HTTP Communication
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CSA

Published:

Updated: 2025-06-25T13:14:07.630Z

Reserved: 2025-05-22T09:41:25.401Z

Link: CVE-2025-48463

cve-icon Vulnrichment

Updated: 2025-06-24T16:39:20.376Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-24T03:15:33.870

Modified: 2025-07-09T15:03:14.890

Link: CVE-2025-48463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.