2025-10-31 13:42CVE-2025-64386S21sec
PUBLISHED5.2CWE-613

HIJACKING OF THE TOKEN AND GAINING ACCESS

The

equipment grants a JWT token for each connection in the timeline, but during an

active valid session, a hijacking of the token can be done. This will allow an

attacker with the token modify parameters of security, access or even steal the

session without

the legitimate and active session detecting it. The web server allows the

attacker to reuse an old session JWT token while the legitimate session is

active.

Problem type

Affected products

Circutor

TCPRS1plus

1.0.14 - AFFECTED

References

GitHub Security Advisories

GHSA-4m38-cfr7-jx25

The equipment grants a JWT token for each connection in the timeline, but during an active valid...

https://github.com/advisories/GHSA-4m38-cfr7-jx25

The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.

JSON source

Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2025-64386",
    "assignerOrgId": "50b5080a-775f-442e-83b5-926b5ca517b6",
    "assignerShortName": "S21sec",
    "dateUpdated": "2025-10-31T17:48:32.514Z",
    "dateReserved": "2025-10-31T13:13:35.299Z",
    "datePublished": "2025-10-31T13:42:32.743Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "50b5080a-775f-442e-83b5-926b5ca517b6",
        "shortName": "S21sec",
        "dateUpdated": "2025-10-31T14:23:19.156Z"
      },
      "title": "HIJACKING OF THE TOKEN AND GAINING ACCESS",
      "descriptions": [
        {
          "lang": "en",
          "value": "The\nequipment grants a JWT token for each connection in the timeline, but during an\nactive valid session, a hijacking of the token can be done. This will allow an\nattacker with the token modify parameters of security, access or even steal the\nsession without\nthe legitimate and active session detecting it. The web server allows the\nattacker to reuse an old session JWT token while the legitimate session is\nactive.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": " The\nequipment grants a JWT token for each connection in the timeline, but during an\nactive valid session, a hijacking of the token can be done. This will allow an\nattacker with the token modify parameters of security, access or even steal the\nsession without\nthe legitimate and active session detecting it. The web server allows the\nattacker to reuse an old session JWT token while the legitimate session is\nactive."
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Circutor",
          "product": "TCPRS1plus",
          "defaultStatus": "unknown",
          "versions": [
            {
              "version": "1.0.14",
              "status": "affected",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-613 Insufficient Session Expiration",
              "cweId": "CWE-613",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://circutor.com/productos/iot-industrial-y-automatizacion/conversores-y-pasarelas/product/D80010./"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-593",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-593 Session Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Víctor Bello Cuevas",
          "type": "finder"
        },
        {
          "lang": "en",
          "value": "Aarón Flecha Menéndez",
          "type": "finder"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2025-10-31T17:48:32.514Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}

Mitre source

https://cveawg.mitre.org/api/cve/CVE-2025-64386