Overview
CVE-2025-13221 is a medium severity vulnerability affecting Intelbras UnniTI version 24.07.11. This vulnerability allows for the unprotected storage of user credentials in plaintext, specifically within the /xml/sistema/usuarios.xml file. An attacker can remotely exploit this flaw by manipulating the Usuario/Senha argument.
Technical Details
The vulnerability resides in an unknown function within the /xml/sistema/usuarios.xml file. By manipulating the Usuario/Senha argument, an attacker can cause the system to store credentials in plaintext within the XML file. The exposed data contains sensitive user authentication information, potentially granting unauthorized access to the affected system.
CVSS Analysis
The vulnerability has been assigned a CVSS score of 5.3, classifying it as a MEDIUM severity issue. This score reflects the combination of factors such as the remote attack vector, the low attack complexity, the need for no privileges, and the medium impact on confidentiality. The metric string isn’t publicly available, but the 5.3 score points to the risk of confidentiality breach.
Possible Impact
The impact of this vulnerability can be significant. An attacker who successfully exploits CVE-2025-13221 can gain unauthorized access to the Intelbras UnniTI system. This could lead to:
- Compromise of sensitive data stored within the system.
- Unauthorized modification of system configurations.
- Denial of service.
- Further exploitation of the network to which the device is connected.
Mitigation or Patch Steps
Currently, information regarding a specific patch or fix from Intelbras is not publicly available. Until an official patch is released, the following mitigation steps are recommended:
- Monitor Network Traffic: Closely monitor network traffic for any suspicious activity targeting the
/xml/sistema/usuarios.xmlfile. - Restrict Access: Limit access to the Intelbras UnniTI system to only authorized personnel.
- Implement Strong Password Policies: Enforce strong password policies for all user accounts.
- Contact Intelbras Support: Contact Intelbras support to inquire about the availability of a patch or workaround.
- Web Application Firewall (WAF): Consider implementing a web application firewall to filter potentially malicious requests.
Stay updated on Intelbras’s website and security advisories for any official updates or patches related to CVE-2025-13221.
