Blog HackRTU

 

Aprende sobre vulnerabilidades, información técnica con una perspectiva diferente y estate a la última de todos los movimientos de HackRTU

 

Descubre los últimos artículos sobre ciberseguridad industrial, vulnerabilidades OT, análisis de dispositivos, investigaciones técnicas, 0‑days y noticias relevantes del sector. En el blog de HackRTU profundizamos en la seguridad de sistemas industriales, en la familia de estándares IEC 62443 y tendencias e investigación en el ámbito de la ciberseguridad industrial.

 

CVE-2025-13651 AFFECTING ZEUSWEB FROM MICROCOM

 

ADVISORY HRTU#0001

 

 

The HackRTU CNA has coordinated the new vulnerability CVE-2025-13651, from medium severity, in the ZeusWeb industrial SCADA solution of MICROCOM. This vulnerability has been discovered by Aarón Flecha Menéndez and Víctor Bello Cuevas.

 

DETAILS OF THE AFFECTED SOLUTION:

  • Provider: Microcom
  • Specific model: ZeusWeb
  • Affected firmware version: 6.1.31

 

SPECIFIC INFORMATION OF THE 0-DAY VULNERABILITY:

The vulnerabilities have been assigned the following codes, CVSS v4.0 base score, CVSS vector, CWE and CAPEC vulnerability type for each vulnerability:

  • CVE-2025-13651: LEAK OF SENSITIVE INFORMATION ON MICROCOM'S ZEUSWEB
    • CVSS v4.0: 6,9 (Medium)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
    • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
    • CAPEC-224 Fingerprinting
      • CAPEC-541 Application Fingerprinting
        • CAPEC-170 Web Application Fingerprinting
    • CPE 2.3 Applicability:
      • cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:*
    • EPSS: **Will be updated as soon as published**

 

CVE DESCRIPTION:

Exposure of Sensitive System Information to an Unauthorized Actor vulnerability in Microcom ZeusWeb allows Web Application Fingerprinting of sensitive data. Sending malformed requests or requests that do not have a correct response from the web server allows a malicious user to obtain information about the versions of the technologies used.

This issue affects ZeusWeb: 6.1.31.

 

SOLUTIONS, MITIGATIONS AND INFORMATION:

The provider Microcom has implemented the new version 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.

 

REFERENCES:

Specific links related to the notice:

 

 

HACKRTU TEAM