Cybersecurity Vulnerabilities

CVE-2025-13221: Intelbras UnniTI Credentials Stored in Plaintext!

Overview

CVE-2025-13221 is a medium severity vulnerability affecting Intelbras UnniTI version 24.07.11. This vulnerability allows for the unprotected storage of user credentials in plaintext, specifically within the /xml/sistema/usuarios.xml file. An attacker can remotely exploit this flaw by manipulating the Usuario/Senha argument.

Technical Details

The vulnerability resides in an unknown function within the /xml/sistema/usuarios.xml file. By manipulating the Usuario/Senha argument, an attacker can cause the system to store credentials in plaintext within the XML file. The exposed data contains sensitive user authentication information, potentially granting unauthorized access to the affected system.

CVSS Analysis

The vulnerability has been assigned a CVSS score of 5.3, classifying it as a MEDIUM severity issue. This score reflects the combination of factors such as the remote attack vector, the low attack complexity, the need for no privileges, and the medium impact on confidentiality. The metric string isn’t publicly available, but the 5.3 score points to the risk of confidentiality breach.

Possible Impact

The impact of this vulnerability can be significant. An attacker who successfully exploits CVE-2025-13221 can gain unauthorized access to the Intelbras UnniTI system. This could lead to:

  • Compromise of sensitive data stored within the system.
  • Unauthorized modification of system configurations.
  • Denial of service.
  • Further exploitation of the network to which the device is connected.

Mitigation or Patch Steps

Currently, information regarding a specific patch or fix from Intelbras is not publicly available. Until an official patch is released, the following mitigation steps are recommended:

  • Monitor Network Traffic: Closely monitor network traffic for any suspicious activity targeting the /xml/sistema/usuarios.xml file.
  • Restrict Access: Limit access to the Intelbras UnniTI system to only authorized personnel.
  • Implement Strong Password Policies: Enforce strong password policies for all user accounts.
  • Contact Intelbras Support: Contact Intelbras support to inquire about the availability of a patch or workaround.
  • Web Application Firewall (WAF): Consider implementing a web application firewall to filter potentially malicious requests.

Stay updated on Intelbras’s website and security advisories for any official updates or patches related to CVE-2025-13221.

References

Cybersecurity specialist and founder of Gowri Shankar Infosec - a professional blog dedicated to sharing actionable insights on cybersecurity, data protection, server administration, and compliance frameworks including SOC 2, PCI DSS, and GDPR.

Leave a Reply

Your email address will not be published. Required fields are marked *