7.6 CVE-2025-23178

 

CWE-923: Improper Restriction of Communication Channel to Intended Endpoints
https://nvd.nist.gov/vuln/detail/CVE-2025-23178

Categories

CWE-923 : Improper Restriction of Communication Channel to Intended Endpoints
The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) S-bus functionality in a home automation product performs access control using an IP allowlist, which can be bypassed by a forged IP address. A troubleshooting tool exposes a web server on a random port between 9000-65535 that could be used for information gathering A WAN interface on a router has firewall restrictions enabled for IPv4, but it does not for IPv6, which is enabled by default Product has a Silverlight cross-domain policy that does not restrict access to another application, which allows remote attackers to bypass the Same Origin Policy. Mobile banking application does not verify hostname, leading to financial loss. chain: incorrect "goto" in Apple SSL product bypasses certificate validation, allowing Adversry-in-the-Middle (AITM) attack (Apple "goto fail" bug). CWE-705 (Incorrect Control Flow Scoping) -> CWE-561 (Dead Code) -> CWE-295 (Improper Certificate Validation) -> CWE-393 (Return of Wrong Status Code) -> CWE-300 (Channel Accessible by Non-Endpoint). DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning

References


 

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
161 Infrastructure Manipulation
High
481 Contradictory Destinations in Traffic Routing Schemes
High
501 Android Activity Hijack
Medium
697 DHCP Spoofing
High


MITRE


Techniques

id description
T1090.004 Proxy:Domain Fronting
T1557.003 Adversary-in-the-Middle: DHCP Spoofing
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1020 If it is possible to inspect HTTPS traffic, the captures can be analyzed for connections that appear to be domain fronting.
M1031 Network intrusion detection and prevention systems that can identify traffic patterns indicative of AiTM activity can be used to mitigate activity at the network level.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.