Cyber Posture

CVE-2025-22960

High

Published: 13 February 2025

Published
13 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22960 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AU-13 (Monitoring for Information Disclosure).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AU-9 requires protection of audit information from unauthorized access, directly preventing exposure of sensitive session IDs and tokens in the accessible log files.

prevent

AC-14 limits and documents permitted actions without authentication, preventing unauthenticated access to sensitive debug log files.

detect

AU-13 monitors systems for unauthorized information disclosure, enabling detection of access to log files revealing session information.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

The vulnerability in the public-facing web management interface exposes session IDs and auth tokens in accessible logs, directly enabling T1190 for initial exploitation and T1550.004 to use the stolen web session material for hijacking.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK).…

more

Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices.

Deeper analysisAI

CVE-2025-22960 is a session hijacking vulnerability in the web-based management interface of GatesAir Maxiva UAXT and VAXT transmitters. Unauthenticated attackers can access exposed log files located at /logs/debug/xteLog*, which may reveal sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). The vulnerability, published on 2025-02-13, is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) with a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).

Attackers with network access to the affected transmitters can exploit this flaw without authentication by directly retrieving the exposed log files. Successful exploitation allows them to hijack active sessions using the disclosed session IDs and tokens, resulting in unauthorized access to the management interface and potential privilege escalation on the devices.

Further details, including potential mitigation guidance, are available in the referenced research repository at https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22960.

Details

CWE(s)

CVEs Like This One

CVE-2026-24870Shared CWE-200
CVE-2024-57716Shared CWE-200
CVE-2026-23743Shared CWE-200
CVE-2025-67274Shared CWE-200
CVE-2026-34305Shared CWE-200
CVE-2026-21532Shared CWE-200
CVE-2025-25975Shared CWE-200
CVE-2025-22918Shared CWE-200
CVE-2026-2262Shared CWE-200
CVE-2026-40584Shared CWE-200

References