CVE-2025-6260
Published: 24 July 2025
Summary
CVE-2025-6260 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Cisa (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 42.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the missing authentication for critical function (CWE-306) by restricting permitted actions without identification or authentication, preventing unauthenticated credential resets via web interface manipulation.
Enforces approved access authorizations on the embedded web server, blocking unauthenticated attackers from manipulating elements to reset user credentials.
Requires unique identification and authentication for non-organizational users accessing the web server, mitigating unauthenticated local or remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated exploitation of public-facing embedded web server (T1190) enabling credential reset/account manipulation (T1098).
NVD Description
The embedded web server on the thermostat listed version ranges contain a vulnerability that allows unauthenticated attackers, either on the local area network or from the Internet via a router with port forwarding set up, to gain direct access to…
more
the thermostat's embedded web server and reset user credentials by manipulating specific elements of the embedded web interface.
Deeper analysisAI
CVE-2025-6260 is a critical vulnerability in the embedded web server on the thermostat across listed version ranges, stemming from CWE-306 (Missing Authentication for Critical Function). It enables unauthenticated attackers to gain direct access to the embedded web server and reset user credentials by manipulating specific elements of the embedded web interface. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
Unauthenticated attackers positioned on the local area network, or remotely from the Internet if the router has port forwarding configured, can exploit this vulnerability. Exploitation grants direct access to the web server, allowing credential resets that could compromise thermostat control, potentially enabling unauthorized environmental manipulations in affected environments.
Mitigation guidance is detailed in the CISA ICS Advisory ICSA-25-205-02, available at https://www.cisa.gov/news-events/ics-advisories/icsa-25-205-02.
Details
- CWE(s)