CVE-2025-25729
Published: 28 February 2025
Summary
CVE-2025-25729 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 directly prohibits hardcoded credentials by requiring proper authenticator management, distribution, protection, and changes to prevent unauthorized disclosure.
SI-2 mandates timely flaw remediation through patching the affected firmware versions to eliminate the hardcoded credential exposure during update or boot.
AU-13 specifically monitors systems for unauthorized information disclosures, enabling detection of credential leaks during the vulnerable update or boot processes.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated info disclosure in network-accessible firmware directly enables T1190 (exploiting public-facing application) and T1552.001 (obtaining hardcoded credentials in files) during update/boot exposure.
NVD Description
An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process.
Deeper analysisAI
CVE-2025-25729 is an information disclosure vulnerability classified under CWE-200, affecting Bosscomm IF740 Firmware versions 11001.7078 and v11001.0000, as well as System versions 6.25 and 6.00. Published on 2025-02-28, it enables attackers to obtain hardcoded cleartext credentials exposed during the device's update or boot process. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to its confidentiality impact.
Any unauthenticated attacker with network access can exploit this vulnerability remotely, as it requires low complexity, no privileges, and no user interaction. Exploitation allows retrieval of sensitive hardcoded credentials in cleartext, potentially granting further access to the affected OBD2 tablet device or related systems.
Mitigation guidance is available in the GainSec advisory at https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/, which details this and related vulnerabilities in the Bosscomm OBD2 tablet. Security practitioners should consult this reference for patching or workaround recommendations specific to the affected firmware and system versions.
Details
- CWE(s)