Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18991 Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.
Fixes

Solution

This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00016}

epss

{'score': 0.00019}


Thu, 10 Jul 2025 00:30:00 +0900

Type Values Removed Values Added
First Time appeared Advantech
Advantech wise-4010lan
Advantech wise-4010lan Firmware
Advantech wise-4050lan
Advantech wise-4050lan Firmware
Advantech wise-4060lan
Advantech wise-4060lan Firmware
CPEs cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:*
cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:*
cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:*
cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:advantech:wise-4060lan_firmware:-:*:*:*:*:*:*:*
Vendors & Products Advantech
Advantech wise-4010lan
Advantech wise-4010lan Firmware
Advantech wise-4050lan
Advantech wise-4050lan Firmware
Advantech wise-4060lan
Advantech wise-4060lan Firmware

Wed, 25 Jun 2025 23:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-341

Wed, 25 Jun 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 12:15:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Tue, 24 Jun 2025 11:30:00 +0900

Type Values Removed Values Added
Description Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.
Title Weak Session Cookie Entropy
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CSA

Published:

Updated: 2025-06-25T13:23:33.993Z

Reserved: 2025-05-22T09:41:25.401Z

Link: CVE-2025-48461

cve-icon Vulnrichment

Updated: 2025-06-24T16:45:41.770Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-24T03:15:33.613

Modified: 2025-07-09T15:02:51.153

Link: CVE-2025-48461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses