CVE-2025-58083
Published: 15 November 2025
Summary
CVE-2025-58083 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Cisa (inferred from references). Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 explicitly defines and limits actions allowable without identification or authentication, directly preventing unauthorized remote device resets via the unauthenticated web server.
IA-8 requires identification and authentication for non-organizational users, blocking unauthenticated external attackers from exploiting the web server vulnerability.
AC-3 enforces approved access control policies, ensuring authentication is required before sensitive operations like remote device reset.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an authentication bypass in an embedded web server, directly enabling exploitation of a public-facing application to remotely reset the device.
NVD Description
General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to remotely reset the device.
Deeper analysisAI
CVE-2025-58083 is a critical authentication bypass vulnerability (CWE-306) in the embedded web server of the General Industrial Controls Lynx+ Gateway. Published on 2025-11-15, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), stemming from the absence of required authentication mechanisms that could enable unauthorized remote device reset.
An unauthenticated attacker with network access to the affected gateway can exploit this vulnerability with low complexity and no user interaction. Exploitation allows remote reset of the device, resulting in high impacts to confidentiality, integrity, and availability, particularly in operational technology environments where device downtime could disrupt industrial controls.
The CISA ICS advisory ICSA-25-317-08 details mitigation recommendations. Security practitioners should consult https://www.cisa.gov/news-events/ics-advisories/icsa-25-317-08 and the associated CSAF document at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-317-08.json for patch information and remediation guidance.
Details
- CWE(s)