CVE-2025-25281
Published: 13 February 2025
Summary
CVE-2025-25281 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Outbackpower Mojave Inverter Oghi8048A Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-14 (Public Access Protections) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates protections for public web servers to prevent unauthorized access and disclosure of sensitive information, directly countering URL modification exploits in web components.
Requires filtering of information output from web applications to non-privileged users, preventing leakage of sensitive network details in responses to tampered URLs.
Enforces validation of inputs such as URL parameters to block attacker manipulation that leads to unauthorized disclosure of target network information.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote info disclosure via URL manipulation in public-facing web component directly maps to T1190 exploitation; resulting network details disclosure enables T1016 for configuration discovery.
NVD Description
An attacker may modify the URL to discover sensitive information about the target network.
Deeper analysisAI
CVE-2025-25281 is an information disclosure vulnerability (CWE-200) published on 2025-02-13, with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). It allows an attacker to modify the URL of an affected web component to discover sensitive information about the target network. The vulnerability is linked to Outback Power products, as referenced in the vendor's site and a CISA ICS advisory.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation results in high-impact confidentiality loss, enabling discovery of sensitive network details without affecting integrity or availability.
Mitigation guidance is available in CISA ICS Advisory ICSA-25-044-17 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17. Additional support can be obtained by contacting Outback Power at https://old.outbackpower.com/about-outback/contact/contact-us.
Details
- CWE(s)