User names used to access the web management interface are limited to
the device identifier, which is a numerical identifier no more than 10
digits. A malicious actor can enumerate potential targets by
incrementing or decrementing from known identifiers or through
enumerating random digit sequences.
Fixes

Solution

No solution given by the vendor.


Workaround

SinoTrack did not respond to CISA's request for coordination. Please contact SinoTrack https://www.sinotrackgps.com/help-center for more information.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00055}

epss

{'score': 0.0006}


Thu, 12 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Description User names used to access the web management interface are limited to the device identifier, which is a numerical identifier no more than 10 digits. A malicious actor can enumerate potential targets by incrementing or decrementing from known identifiers or through enumerating random digit sequences.
Title SinoTrack GPS Receiver Weak Authentication
Weaknesses CWE-204
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-06-12T20:14:57.139Z

Reserved: 2025-06-02T20:33:03.000Z

Link: CVE-2025-5485

cve-icon Vulnrichment

Updated: 2025-06-12T20:14:49.917Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-12T20:15:22.283

Modified: 2025-06-16T12:32:18.840

Link: CVE-2025-5485

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.