CVE-2025-26689
Published: 31 March 2025
Summary
CVE-2025-26689 is a critical-severity Forced Browsing (CWE-425) vulnerability in Jvn (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access to system resources, directly preventing unauthorized forced browsing to sensitive product data and settings via crafted HTTP requests.
Monitors and controls communications at system boundaries, blocking remote attackers' crafted HTTP requests to vulnerable endpoints on the exposed web interface.
Validates information inputs such as HTTP requests, mitigating specially crafted requests that exploit the forced browsing vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a forced browsing vulnerability in the web interface of a publicly accessible monitoring device, allowing remote unauthenticated access to internal functions for data exposure and modifications, which directly maps to exploitation of public-facing applications.
NVD Description
Direct request ('Forced Browsing') issue exists in CHOCO TEI WATCHER mini (IB-MCT001) all versions. If a remote attacker sends a specially crafted HTTP request to the product, the product data may be obtained or deleted, and/or the product settings may…
more
be altered.
Deeper analysisAI
CVE-2025-26689 is a Direct request ('Forced Browsing') vulnerability, classified under CWE-425, affecting all versions of the CHOCO TEI WATCHER mini (IB-MCT001) device. This flaw enables unauthorized access to internal product functions through specially crafted HTTP requests, potentially exposing sensitive data or allowing unauthorized modifications.
The vulnerability can be exploited by any remote attacker over the network (AV:N) with low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), earning a CVSS v3.1 base score of 9.8 (C:H/I:H/A:H). Successful exploitation allows the attacker to obtain or delete product data and alter product settings, compromising confidentiality, integrity, and availability.
Advisories from JVN (JVNVU#91154745), CISA (ICS-A-25-084-04), manufacturer Inaba Denki Sangyo (chocomini_vulnerability.pdf), and Nozomi Networks detail the issue in the context of production line monitoring cameras. These references address risks such as remote surveillance and interference with stoppage recording functions.
The Nozomi Networks analysis highlights that vulnerabilities like this remain unpatched in deployed production line cameras, increasing exposure to remote attacks.
Details
- CWE(s)