CVE-2025-70048
Published: 09 March 2026
Summary
CVE-2025-70048 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Nexus Nexusinterface. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.
By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.
Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.
Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.
Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.
Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.
Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.
Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Cleartext transmission (CWE-319) directly enables passive network interception of credentials/sensitive data, mapping to Network Sniffing.
NVD Description
An issue pertaining to CWE-319: Cleartext Transmission of Sensitive Information was discovered in Nexusoft NexusInterface v3.2.0-beta.2.
Deeper analysisAI
CVE-2025-70048 is a vulnerability involving CWE-319: Cleartext Transmission of Sensitive Information in Nexusoft NexusInterface version 3.2.0-beta.2. This flaw allows sensitive data to be transmitted without encryption, exposing it to interception. The vulnerability has a CVSS v3.1 base score of 7.5, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating high severity primarily due to confidentiality impact.
Remote attackers require no privileges or user interaction to exploit this issue over the network with low complexity. Successful exploitation enables attackers to capture sensitive information transmitted in cleartext, potentially leading to data leakage such as credentials, personal details, or other confidential material without affecting integrity or availability.
Further details, including potential advisories or patches, can be found in the provided references: https://gist.github.com/zcxlighthouse/ae89b0542ef3e39cd6dcac9d529c2c69, https://github.com/Nexusoft, and https://github.com/Nexusoft/NexusInterface. Security practitioners should review these sources for mitigation guidance specific to NexusInterface deployments.
Details
- CWE(s)