FKIE_CVE-2025-9229
Vulnerability from fkie_nvd - Published: 2025-08-20 09:15 - Updated: 2025-11-05 13:15
Severity ?
Summary
Information disclosure vulnerability in error handling in MiR software prior to version 3.0.0 allows unauthenticated attackers to view detailed error information, such as file paths and other data, via access to verbose error pages.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure vulnerability in error handling in MiR software prior to version 3.0.0 allows unauthenticated attackers to view detailed error information, such as file paths and other data, via access to verbose error pages."
},
{
"lang": "es",
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el manejo de errores en MiR software anterior a la versi\u00f3n 3.0.0 permite a atacantes no autenticados ver informaci\u00f3n detallada del error, como rutas de archivos y otros datos, a trav\u00e9s del acceso a p\u00e1ginas de error detalladas."
}
],
"id": "CVE-2025-9229",
"lastModified": "2025-11-05T13:15:35.407",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"type": "Secondary"
}
]
},
"published": "2025-08-20T09:15:29.180",
"references": [
{
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"url": "https://mobile-industrial-robots.com/security-advisories/information-disclosure"
},
{
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"url": "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/"
}
],
"sourceIdentifier": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-209"
}
],
"source": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…