CVE-2025-24865
Published: 13 February 2025
Summary
CVE-2025-24865 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Myscada Mypro. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires limiting critical administrative functions without identification or authentication, preventing unauthorized access to the mySCADA myPRO Manager web interface.
Mandates identification and authentication for organizational users before system access, mitigating the complete lack of credentials required for the vulnerable admin interface.
Enforces approved access control policies to block unauthorized retrieval of sensitive information and file uploads via the authentication-bypassed interface.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authentication bypass on public-facing admin web interface directly enables T1190 exploitation; facilitates T1005 via unauthorized sensitive data retrieval and T1105 via arbitrary file uploads without credentials.
NVD Description
The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password.
Deeper analysisAI
CVE-2025-24865 is a critical authentication bypass vulnerability in the administrative web interface of mySCADA myPRO Manager. Published on 2025-02-13, it stems from CWE-306 (Missing Authentication for Critical Function), allowing the interface to be accessed without any credentials. This enables unauthorized retrieval of sensitive information and file uploads without the associated password, earning a perfect CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
The vulnerability can be exploited by any unauthenticated attacker with network access to the affected interface. No user privileges, interaction, or complex conditions are required, making it highly accessible remotely with low attack complexity. Successful exploitation grants attackers the ability to extract sensitive data and upload arbitrary files, resulting in high impacts to confidentiality, integrity, and availability, compounded by a change in scope.
Mitigation guidance is detailed in CISA ICS Advisory ICSA-25-044-16 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16. Vendor resources include the mySCADA contacts page at https://www.myscada.org/contacts/ and downloads page at https://www.myscada.org/downloads/mySCADAPROManager/, which may provide patches or additional remediation steps.
Details
- CWE(s)