mySCADA myPRO Manager, Authentication Bypass, CVE-2025-24865 (Critical)

Listen to this Post

The administrative web interface of mySCADA myPRO Manager is vulnerable to an authentication bypass, allowing unauthorized attackers to access sensitive information and upload files without requiring a password. This vulnerability, identified as CVE-2025-24865, is classified as critical with a CVSS score of 10.0. The issue arises due to the lack of proper authentication mechanisms in the web interface, enabling attackers to exploit the system remotely without any user interaction. The vulnerability is particularly dangerous as it allows attackers to manipulate system configurations, retrieve confidential data, and potentially disrupt operations.
The CVSS 4.0 vector string for this vulnerability is: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H. This indicates that the attack vector is network-based, the attack complexity is low, and no user interaction or privileges are required to exploit the vulnerability. The impact spans across confidentiality, integrity, and availability, making it a severe threat to systems running vulnerable versions of mySCADA myPRO Manager.

DailyCVE Form

Platform: mySCADA myPRO Manager
Version: Not specified
Vulnerability: Authentication Bypass
Severity: Critical
Date: 02/13/2025

(End of form)

What Undercode Say:

Exploitation:

  1. Attackers can access the administrative interface without credentials.
  2. Sensitive data can be retrieved via unauthenticated API calls.
  3. Malicious files can be uploaded to the system, leading to remote code execution.

Protection:

1. Apply the latest security patches from mySCADA.

  1. Restrict access to the administrative interface using firewalls.

3. Implement multi-factor authentication (MFA) for all users.

Commands:

  • Check for open ports: `nmap -p 80,443 `
    – Test for vulnerability: Use a custom script to send unauthenticated requests to the web interface.
  • Monitor logs: `tail -f /var/log/mySCADA/access.log`

Code:

import requests
target_url = "http://<target_ip>/admin"
response = requests.get(target_url)
if response.status_code == 200:
print("Vulnerable to CVE-2025-24865")

URLs:

Analytics:

  • Affected Systems: Industrial control systems using mySCADA myPRO Manager.
  • Attack Surface: Network-exposed administrative interfaces.
  • Mitigation Rate: Low, due to lack of awareness in industrial environments.
    By following these steps, organizations can mitigate the risks associated with CVE-2025-24865 and secure their systems against potential attacks.

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-24865
Extra Source Hub:
Undercode

Image Source:

Undercode AI DI v2Featured Image

Scroll to Top