Westermo-25-08: Sensitive Information in Logging
Severity: HIGH
Date: 2025-06-30
Description
Westermo has identified an issue where a threat actor could potentially gain unauthorized access to sensitive information.
Affected versions
WeOS 5: Affects all versions of WeOS 5 from version 5.24.0.
WeOS 4: is not affected.
Impact
Due to verbose logging, sensitive information like credentials is written to a log file. This log file can be read by users authorized to read syslog files. A potential adversary could gain access to sensitive information through system logging information.
Severity
Category | Score |
---|---|
Base score | 8.5 |
Environmental score | 8.1 |
Vector string | #CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/MAV:A |
Mitigation
Westermo recommends the following actions to mitigate the vulnerability:
- Limit administration account access to trusted parties. Regularly review and update the list of trusted parties to ensure only current and necessary personnel have access.
- Store audit records on an independent syslog server. Ensure the syslog server is hardened and regularly updated to protect against vulnerabilities. Implement access controls and encryption for the stored audit records to prevent unauthorized access.
- Enable TLS for remote logs. Use strong cipher suites and enforce the use of TLS 1.2 or higher to ensure secure communication.
Updates
Currently no update is available.
References
Revision History
Jun 30, 2025: Initial release