Cyber Posture

CVE-2025-25729

High

Published: 28 February 2025

Published
28 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0013 31.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25729 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 directly prohibits hardcoded credentials by requiring proper authenticator management, distribution, protection, and changes to prevent unauthorized disclosure.

prevent

SI-2 mandates timely flaw remediation through patching the affected firmware versions to eliminate the hardcoded credential exposure during update or boot.

detect

AU-13 specifically monitors systems for unauthorized information disclosures, enabling detection of credential leaks during the vulnerable update or boot processes.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Remote unauthenticated info disclosure in network-accessible firmware directly enables T1190 (exploiting public-facing application) and T1552.001 (obtaining hardcoded credentials in files) during update/boot exposure.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process.

Deeper analysisAI

CVE-2025-25729 is an information disclosure vulnerability classified under CWE-200, affecting Bosscomm IF740 Firmware versions 11001.7078 and v11001.0000, as well as System versions 6.25 and 6.00. Published on 2025-02-28, it enables attackers to obtain hardcoded cleartext credentials exposed during the device's update or boot process. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to its confidentiality impact.

Any unauthenticated attacker with network access can exploit this vulnerability remotely, as it requires low complexity, no privileges, and no user interaction. Exploitation allows retrieval of sensitive hardcoded credentials in cleartext, potentially granting further access to the affected OBD2 tablet device or related systems.

Mitigation guidance is available in the GainSec advisory at https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/, which details this and related vulnerabilities in the Bosscomm OBD2 tablet. Security practitioners should consult this reference for patching or workaround recommendations specific to the affected firmware and system versions.

Details

CWE(s)

Affected Products

Bosscomm IF740 Firmware
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-30928Shared CWE-200
CVE-2025-22961Shared CWE-200
CVE-2026-2268Shared CWE-200
CVE-2025-27784Shared CWE-200
CVE-2026-24870Shared CWE-200
CVE-2024-57716Shared CWE-200
CVE-2026-27161Shared CWE-200
CVE-2026-23743Shared CWE-200
CVE-2025-67274Shared CWE-200
CVE-2026-34305Shared CWE-200

References