Логотип exploitDog
bind:CVE-2025-15017
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-15017

Количество 3

Количество 3

nvd логотип

CVE-2025-15017

около 1 месяца назад

A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.

EPSS: Низкий
github логотип

GHSA-r3r9-v3q6-hv5j

около 1 месяца назад

A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.

EPSS: Низкий
fstec логотип

BDU:2026-00359

около 1 месяца назад

Уязвимость UART-интерфейса микропрограммного обеспечения промышленных серверов NPort 5000 Series, позволяющая нарушителю получить несанкционированный доступ к внутренним функциям отладки

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-15017

A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.

0%
Низкий
около 1 месяца назад
github логотип
GHSA-r3r9-v3q6-hv5j

A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.

0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2026-00359

Уязвимость UART-интерфейса микропрограммного обеспечения промышленных серверов NPort 5000 Series, позволяющая нарушителю получить несанкционированный доступ к внутренним функциям отладки

CVSS3: 6.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу