CVE-2025-8286
Güralp · Güralp FMUS series seismic monitoring devices
A critical vulnerability has been identified in Güralp FMUS series seismic monitoring devices, allowing unauthorized individuals to gain complete control over the equipment through an unprotected netw.
Executive summary
A critical vulnerability has been identified in Güralp FMUS series seismic monitoring devices, allowing unauthorized individuals to gain complete control over the equipment through an unprotected network service. Successful exploitation could lead to the manipulation of sensitive seismic data, device malfunction, or a complete shutdown of monitoring capabilities, posing significant risks to public safety, infrastructure monitoring, and data integrity.
Vulnerability
The vulnerability resides in the affected seismic monitoring devices, which expose an unauthenticated Telnet service on TCP port 23. This service provides a command-line interface (CLI) that does not require any form of authentication. An attacker with network access to a vulnerable device can connect to the Telnet port and gain immediate, privileged access to modify critical hardware configurations, manipulate or delete seismic data, alter network settings, or render the device inoperable.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the ease of exploitation and the potential for severe impact. Exploitation could lead to significant operational disruptions and safety risks. An attacker could manipulate seismic data, potentially causing false alarms for events like earthquakes or, conversely, hiding real seismic activity, thereby endangering public safety and critical infrastructure. The complete compromise of these devices could lead to a total loss of monitoring capability, significant financial costs for remediation, and severe reputational damage to the organization responsible for the monitoring.
Remediation
Immediate Action: The primary remediation is to apply the security patches provided by the vendor. Organizations should immediately update all affected Güralp FMUS series devices to the latest version. In addition, organizations should begin to monitor for exploitation attempts and review access logs for any signs of compromise.
Proactive Monitoring: Implement network monitoring to detect and alert on any unauthorized connection attempts to the Telnet port (TCP/23) on these devices. System and access logs on the devices and surrounding network equipment should be reviewed for any signs of unauthorized access, unusual command execution, or unexpected configuration changes.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to mitigate the risk. Isolate the seismic monitoring devices onto a segmented network with strict access controls. Use a firewall or Access Control Lists (ACLs) to block all inbound traffic to the Telnet port (TCP/23) from any untrusted network or host. Access should only be permitted from a secure management bastion host.
Exploitation status
Public Exploit Available: true
Analyst recommendation
Given the critical CVSS score of 9.8 and the trivial nature of exploitation, this vulnerability poses an immediate and severe risk. We strongly recommend that all organizations using Güralp FMUS series devices prioritize the immediate application of vendor-supplied patches. If patching cannot be performed immediately, the compensating controls outlined above, particularly network segmentation and firewall rules to block Telnet access, must be implemented as an urgent priority to prevent potential compromise and ensure the integrity of critical seismic monitoring operations.