Cyber Posture

CVE-2025-30132

Critical

Published: 18 March 2025

Published
18 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0008 23.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-30132 is a critical-severity Improper Access Control (CWE-284) vulnerability. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 23.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-20 (Secure Name/Address Resolution Service (Authoritative Source)) and SC-21 (Secure Name/Address Resolution Service (Recursive or Caching Resolver)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Adversary-in-the-Middle (T1557) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires data origin authentication and integrity checks on DNS responses from authoritative sources, directly preventing hijacking of the unregistered public domain used for internal resolution.

prevent

Mandates secure architecture and provisioning for name resolution services, ensuring internal domains are resolved locally or with safeguards against public internet hijacking.

prevent

Ensures authoritative DNS sources provide origin authentication data, blocking exploitation when devices query the hijackable domain.

MITRE ATT&CK Enterprise TechniquesAI

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
T1041 Exfiltration Over C2 Channel Exfiltration
Adversaries may steal data by exfiltrating it over an existing command and control channel.
Why these techniques?

Vulnerability allows domain registration to hijack resolution, directly enabling traffic interception for Adversary-in-the-Middle (T1557) and data exfiltration over the resulting channel (T1041).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An issue was discovered on IROAD Dashcam V devices. It uses an unregistered public domain name as an internal domain, creating a security risk. During analysis, it was found that this domain was not owned by IROAD, allowing an attacker…

more

to register it and potentially intercept sensitive device traffic. If the dashcam or related services attempt to resolve this domain over the public Internet instead of locally, it could lead to data exfiltration or man-in-the-middle attacks.

Deeper analysisAI

CVE-2025-30132 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) affecting IROAD Dashcam V devices, classified under CWE-284 (Improper Access Control). The issue stems from the devices using an unregistered public domain name as an internal domain, which is not owned by IROAD. This misconfiguration exposes the devices to risks where the domain resolution could be hijacked, as the firmware or related services may attempt to resolve it over the public Internet rather than locally.

Any remote attacker without privileges can exploit this vulnerability by registering the unowned domain name. Once registered, the attacker can intercept sensitive traffic from the dashcam, enabling man-in-the-middle attacks or data exfiltration. The low attack complexity and lack of user interaction requirements make it highly practical for widespread exploitation against exposed devices.

The vulnerability was disclosed by researcher geo-chen via GitHub repositories at https://github.com/geo-chen/IROAD-V and https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-6-public-domain-used-for-internal-domain-name, which detail the finding. No official advisories, patches, or mitigation guidance from IROAD are referenced in the available information.

Details

CWE(s)

CVEs Like This One

CVE-2025-30140Shared CWE-284
CVE-2026-32254Shared CWE-284
CVE-2025-43233Shared CWE-284
CVE-2025-25950Shared CWE-284
CVE-2026-5786Shared CWE-284
CVE-2026-32768Shared CWE-284
CVE-2026-33109Shared CWE-284
CVE-2025-24968Shared CWE-284
CVE-2025-54914Shared CWE-284
CVE-2025-1941Shared CWE-284

References