CVE-2025-15430

was · was Multiple Products

A high-severity vulnerability has been identified in multiple 'was' products, allowing a remote attacker to potentially take full control of affected devices.

Executive summary

A high-severity vulnerability has been identified in multiple 'was' products, allowing a remote attacker to potentially take full control of affected devices. Successful exploitation of this flaw could lead to a complete compromise of the network device, enabling data theft, network disruption, and further unauthorized access into the internal network. Organizations are urged to apply vendor-supplied patches immediately to mitigate this critical risk.

Vulnerability

This vulnerability is a command injection flaw in the device's web-based management interface. An unauthenticated remote attacker can exploit this by sending a specially crafted HTTP request to a specific administrative endpoint. The input is not properly sanitized before being passed to a system shell, allowing the attacker to inject and execute arbitrary operating system commands with the privileges of the web server process, which are typically elevated on these devices.

Business impact

This vulnerability presents a significant risk to the organization, categorized as High severity with a CVSS score of 8.8. An attacker successfully exploiting this flaw can gain complete control over the network device. Potential consequences include interception and exfiltration of sensitive network traffic, deployment of malware, disruption of network services leading to operational downtime, and using the compromised device as a pivot point to launch further attacks against the internal corporate network.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected devices immediately. Prioritize patching for devices with management interfaces exposed to the internet. After patching, review access and system logs for any signs of compromise that may have occurred before the patch was applied.

Proactive Monitoring: Implement enhanced monitoring of network traffic to and from affected devices. Specifically, look for unusual outbound connections, unexpected processes or services running on the devices, and review web access logs for anomalous requests, particularly those containing shell commands or special characters directed at the management interface.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:

  • Restrict access to the device's management interface to a secure, isolated management network.
  • If the management interface must be exposed, place it behind a Web Application Firewall (WAF) with rules designed to block command injection attempts.
  • Implement strict firewall rules to limit all non-essential inbound and outbound traffic from the device itself.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high CVSS score of 8.8, this vulnerability requires immediate attention. We strongly recommend that organizations identify all affected 'was' products within their environment and apply the vendor-provided security patches without delay, prioritizing internet-facing systems. While this CVE is not currently on the CISA KEV list, its severity makes it a prime candidate for future exploitation. If patching cannot be performed immediately, implement the suggested compensating controls to reduce the attack surface and mitigate the immediate risk.