CVE-2025-22960
Published: 13 February 2025
Summary
CVE-2025-22960 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AU-13 (Monitoring for Information Disclosure).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AU-9 requires protection of audit information from unauthorized access, directly preventing exposure of sensitive session IDs and tokens in the accessible log files.
AC-14 limits and documents permitted actions without authentication, preventing unauthenticated access to sensitive debug log files.
AU-13 monitors systems for unauthorized information disclosure, enabling detection of access to log files revealing session information.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability in the public-facing web management interface exposes session IDs and auth tokens in accessible logs, directly enabling T1190 for initial exploitation and T1550.004 to use the stolen web session material for hijacking.
NVD Description
A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK).…
more
Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices.
Deeper analysisAI
CVE-2025-22960 is a session hijacking vulnerability in the web-based management interface of GatesAir Maxiva UAXT and VAXT transmitters. Unauthenticated attackers can access exposed log files located at /logs/debug/xteLog*, which may reveal sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). The vulnerability, published on 2025-02-13, is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) with a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
Attackers with network access to the affected transmitters can exploit this flaw without authentication by directly retrieving the exposed log files. Successful exploitation allows them to hijack active sessions using the disclosed session IDs and tokens, resulting in unauthorized access to the management interface and potential privilege escalation on the devices.
Further details, including potential mitigation guidance, are available in the referenced research repository at https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22960.
Details
- CWE(s)