Cyber Posture

CVE-2025-26689

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0175 82.7th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26689 is a critical-severity Forced Browsing (CWE-425) vulnerability in Jvn (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for logical access to system resources, directly preventing unauthorized forced browsing to sensitive product data and settings via crafted HTTP requests.

prevent

Monitors and controls communications at system boundaries, blocking remote attackers' crafted HTTP requests to vulnerable endpoints on the exposed web interface.

prevent

Validates information inputs such as HTTP requests, mitigating specially crafted requests that exploit the forced browsing vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a forced browsing vulnerability in the web interface of a publicly accessible monitoring device, allowing remote unauthenticated access to internal functions for data exposure and modifications, which directly maps to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Direct request ('Forced Browsing') issue exists in CHOCO TEI WATCHER mini (IB-MCT001) all versions. If a remote attacker sends a specially crafted HTTP request to the product, the product data may be obtained or deleted, and/or the product settings may…

more

be altered.

Deeper analysisAI

CVE-2025-26689 is a Direct request ('Forced Browsing') vulnerability, classified under CWE-425, affecting all versions of the CHOCO TEI WATCHER mini (IB-MCT001) device. This flaw enables unauthorized access to internal product functions through specially crafted HTTP requests, potentially exposing sensitive data or allowing unauthorized modifications.

The vulnerability can be exploited by any remote attacker over the network (AV:N) with low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), earning a CVSS v3.1 base score of 9.8 (C:H/I:H/A:H). Successful exploitation allows the attacker to obtain or delete product data and alter product settings, compromising confidentiality, integrity, and availability.

Advisories from JVN (JVNVU#91154745), CISA (ICS-A-25-084-04), manufacturer Inaba Denki Sangyo (chocomini_vulnerability.pdf), and Nozomi Networks detail the issue in the context of production line monitoring cameras. These references address risks such as remote surveillance and interference with stoppage recording functions.

The Nozomi Networks analysis highlights that vulnerabilities like this remain unpatched in deployed production line cameras, increasing exposure to remote attacks.

Details

CWE(s)

Affected Products

Jvn
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-0790Shared CWE-425
CVE-2026-22732Shared CWE-425
CVE-2026-1978Shared CWE-425
CVE-2025-52024Shared CWE-425
CVE-2026-32867Shared CWE-425
CVE-2026-25679Shared CWE-425
CVE-2026-4532Shared CWE-425
CVE-2025-2147Shared CWE-425
CVE-2026-34056Shared CWE-425
CVE-2022-43110Shared CWE-425

References