CVE-2025-39202

| EUVD-2025-19003 HIGH
2025-06-24 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19003
CVE Published
Jun 24, 2025 - 12:15 nvd
HIGH 7.3

Description

A vulnerability exists in in the Monitor Pro interface of the MicroSCADA X SYS600 product. An authenticated user with low privileges can see and overwrite files causing information leak and data corruption.

Analysis

CVE-2025-39202 is a local privilege escalation vulnerability in MicroSCADA X SYS600's Monitor Pro interface that allows authenticated users with low privileges to read and overwrite arbitrary files, leading to information disclosure and data corruption. The vulnerability affects the SYS600 product line and requires local access with valid credentials; while the CVSS score of 7.3 indicates moderate-to-high severity, real-world exploitability depends on whether this vulnerability has been added to CISA's KEV catalog or has publicly available proof-of-concept code.

Technical Context

CVE-2025-39202 stems from improper access control mechanisms (CWE-269: Improper Access Control) within the Monitor Pro interface component of MicroSCADA X SYS600. The vulnerability likely results from inadequate file permission validation or missing privilege escalation checks when low-privileged authenticated users interact with file operations. The SYS600 is an industrial control/SCADA system, and the Monitor Pro interface is a supervisory component responsible for system monitoring and configuration. The root cause (CWE-269) indicates the application fails to enforce proper authorization boundaries, allowing authenticated sessions with minimal privileges to access resources intended for higher-privilege accounts. This is typical in legacy SCADA systems where interface components may not implement role-based access controls (RBAC) correctly.

Affected Products

MicroSCADA X SYS600 product line, specifically the Monitor Pro interface component. Without explicit version strings provided, the vulnerability likely affects multiple SYS600 firmware versions until a patch is released. CPE string would likely be: cpe:2.3:a:micropower:microscada_x:*:*:*:*:*:*:*:* or cpe:2.3:a:micropower:microscada_x_sys600:*:*:*:*:*:*:*:* (vendor confirmation required). Affected configurations include any SYS600 deployment where Monitor Pro is enabled and local system access is available to authenticated users.

Remediation

Apply the vendor security patch released for CVE-2025-39202 to all affected SYS600 installations. Until patching is possible: (1) Restrict local system access to trusted operators only; disable or limit Monitor Pro interface access to high-privilege accounts if feasible. (2) Implement filesystem-level access controls to protect critical SCADA configuration files and backups from modification by low-privilege service accounts. (3) Monitor file integrity using host-based intrusion detection (HIDS) tools to detect unauthorized file modifications. (4) Review user account privileges and revoke unnecessary local access for service accounts. (5) Contact MicroPower/the SYS600 vendor for advisory links and patch availability—vendor should provide specific patched versions and deployment instructions. (6) For critical systems, isolate SYS600 nodes on a segmented network to limit lateral movement if a low-privilege account is compromised.

Priority Score

37
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

CVE-2025-39202 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy