CVE-2025-63206
Published: 19 November 2025
Description
An authentication bypass issue was discovered in Dasan Switch DS2924 web based interface, firmware versions 1.01.18 and 1.02.00, allowing attackers to gain escalated privileges via storing crafted cookies in the web browser.
Mitigating Controls (NIST 800-53 r5)AI
Access Enforcement requires the system to enforce approved authorizations, directly mitigating the authentication bypass via crafted cookies that allowed unauthorized escalated privileges.
Session Authenticity protects communications sessions from forgery or spoofing, preventing attackers from using crafted cookies to impersonate authenticated users in the web interface.
Information Input Validation ensures checks on inputs like cookies, addressing the lack of validation that enabled the crafted cookie authentication bypass.
Security SummaryAI
CVE-2025-63206 is an authentication bypass vulnerability in the web-based interface of the Dasan Switch DS2924, affecting firmware versions 1.01.18 and 1.02.00. The issue, linked to CWE-306 (Missing Authentication for Critical Function), enables attackers to gain escalated privileges by storing crafted cookies in the web browser. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and high impact potential.
The vulnerability can be exploited by unauthenticated remote attackers with network access to the switch's web interface, requiring low complexity and no user interaction. By injecting crafted cookies, attackers bypass authentication controls, achieving escalated privileges that compromise confidentiality, integrity, and availability of the device to a high degree.
References include the vendor site at http://dasansmc.com/ and a GitHub repository with vulnerability research details at https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63206_Dasan%20Switch%20DS2924%20Authentication%20Bypass. No specific mitigation or patch guidance is detailed in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables exploitation of a public-facing web interface (T1190) for privilege escalation (T1068) via forged web cookies (T1606.001).