Cyber Posture

CVE-2025-58423

High

Published: 06 November 2025

Published
06 November 2025
Modified
21 November 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 34.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.

Security Summary

CVE-2025-58423, published on 2025-11-06, is a high-severity vulnerability (CVSS 8.8, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) stemming from insufficient sanitization of uploaded configuration files, classified under CWE-22 (path traversal). It affects Advantech products as documented in CISA ICS advisory ICSA-25-310-01. An attacker can upload a specially crafted configuration file to trigger denial-of-service conditions, perform directory traversal, or read/write arbitrary files within the context of the local system account.

The attack requires low privileges (PR:L) and can be conducted remotely over the network (AV:N) with low attack complexity and no user interaction. A remote authenticated attacker with low-level access can exploit this to achieve full confidentiality, integrity, and availability impacts, including arbitrary file read/write operations executed as the local system account or causing service disruptions via DoS.

Mitigation guidance is provided in the referenced advisories. Security practitioners should consult the CISA ICS advisory at https://www.cisa.gov/news-events/ics-advisories/icsa-25-310-01, the corresponding CSAF document at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-310-01.json, and contact Advantech support at https://www.advantech.com/emt/contact for patches or additional remediation steps.

Details

CWE(s)
CWE-22

Affected Products

advantech
deviceon\/iedge
≤ 2.0.2

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499 Endpoint Denial of Service Impact
Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.
Why these techniques?

Path traversal (CWE-22) in CVE-2025-58423, CVE-2025-62630, CVE-2025-59171 enables arbitrary file read/write/discovery as local system (T1083, facilitates T1068 priv esc); DoS condition (T1499); remote exploitation of public-facing web app (T1190).

References