CVE-2025-41772
Unknown (Web-Enabled Controller) · wwwupdate Service
The wwwupdate service exposes valid session tokens in plaintext within URL parameters, allowing unauthenticated remote attackers to hijack active user sessions.
Executive summary
Unauthenticated remote attackers can hijack valid user sessions by intercepting plaintext session tokens exposed in the URL parameters of the wwwupdate service.
Vulnerability
The wwwupdate service fails to protect session identifiers, transmitting them as plaintext query parameters in the URL. An unauthenticated attacker can obtain these tokens through various means, such as log inspection, referrer headers, or network sniffing.
Business impact
Session hijacking allows an attacker to assume the identity of an authenticated user, including administrators. With a CVSS score of 7.5, this vulnerability could lead to unauthorized configuration changes or device disruption. The exposure of tokens in URLs is a significant security failure that undermines the entire authentication mechanism.
Remediation
Immediate Action: Apply vendor security updates that move session tokens to secure, HTTP-only cookies or the Authorization header instead of the URL.
Proactive Monitoring: Review web server and proxy logs for session tokens in URLs and clear browser histories/caches on management workstations.
Compensating Controls: Force the use of HTTPS to prevent network sniffing and implement short session timeouts to reduce the window of opportunity for hijacked tokens.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Transmitting session tokens in URLs is a violation of modern security best practices. Administrators should update affected devices immediately and ensure that all management traffic is encrypted and monitored for suspicious session activity.