Cyber Posture

CVE-2025-22960

High

Published: 13 February 2025

Published
13 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices.

Security Summary

CVE-2025-22960 is a session hijacking vulnerability in the web-based management interface of GatesAir Maxiva UAXT and VAXT transmitters. Unauthenticated attackers can access exposed log files located at /logs/debug/xteLog*, which may reveal sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). The vulnerability, published on 2025-02-13, is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) with a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).

Attackers with network access to the affected transmitters can exploit this flaw without authentication by directly retrieving the exposed log files. Successful exploitation allows them to hijack active sessions using the disclosed session IDs and tokens, resulting in unauthorized access to the management interface and potential privilege escalation on the devices.

Further details, including potential mitigation guidance, are available in the referenced research repository at https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22960.

Details

CWE(s)
CWE-200

References