Cyber Posture

CVE-2025-70043

Critical

Published: 23 February 2026

Published
23 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0002 6.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-70043 is a critical-severity Improper Certificate Validation (CWE-295) vulnerability. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 6.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-17 (Public Key Infrastructure Certificates) and SC-8 (Transmission Confidentiality and Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Adversary-in-the-Middle (T1557). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation and management of public key infrastructure certificates, directly preventing acceptance of invalid or untrusted certificates in TLS connections exploited by this CVE.

prevent

Mandates cryptographic protection for transmission confidentiality and integrity, which comprehensively addresses the improper TLS certificate validation enabling MITM attacks.

prevent

Requires identification, reporting, and timely remediation of system flaws, directly mitigating the hardcoded 'rejectUnauthorized: false' vulnerability in the Node.js application.

MITRE ATT&CK Enterprise TechniquesAI

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Directly enables MITM attacks via disabled TLS certificate validation (CWE-295).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in TLS socket options

Deeper analysisAI

CVE-2025-2025-70043, published on 2026-02-23, is a critical vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) corresponding to CWE-295: Improper Certificate Validation in the master branch of Ayms node-To. This Node.js application or module, hosted under the Ayms GitHub organization, disables TLS/SSL certificate validation by explicitly setting the 'rejectUnauthorized' option to false in its TLS socket configurations, allowing connections to servers with invalid or untrusted certificates.

The vulnerability enables remote attackers with network access to exploit it with low complexity, no required privileges, and no user interaction. Exploitation facilitates man-in-the-middle attacks, granting high confidentiality and integrity impacts, such as intercepting sensitive data in transit or injecting malicious content into otherwise encrypted communications.

Mitigation details are available in the referenced sources, including the GitHub repositories at https://github.com/Ayms and https://github.com/Ayms/node-To, as well as the advisory gist at https://gist.github.com/zcxlighthouse/33cc4342dfe650664548b4531d16b655.

Details

CWE(s)

CVEs Like This One

CVE-2025-1193Shared CWE-295
CVE-2025-46788Shared CWE-295
CVE-2026-33810Shared CWE-295
CVE-2026-32627Shared CWE-295
CVE-2024-55581Shared CWE-295
CVE-2025-11043Shared CWE-295
CVE-2026-4434Shared CWE-295
CVE-2026-25160Shared CWE-295
CVE-2025-0500Shared CWE-295
CVE-2026-4396Shared CWE-295

References