Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech wise-deviceon Server
|
|
| CPEs | cpe:2.3:a:advantech:wise-deviceon_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Advantech wise-deviceon Server
|
|
| Metrics |
cvssV3_1
|
Tue, 09 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech
Advantech wise-deviceon |
|
| Vendors & Products |
Advantech
Advantech wise-deviceon |
Fri, 05 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features. | |
| Title | Advantech WISE-DeviceOn Server < 5.4 Hard-coded JWT Key Authentication Bypass | |
| Weaknesses | CWE-321 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-05T17:18:31.747Z
Updated: 2025-12-09T16:41:39.876Z
Reserved: 2025-04-15T19:15:22.578Z
Link: CVE-2025-34256
Updated: 2025-12-09T16:41:37.164Z
Status : Analyzed
Published: 2025-12-05T18:15:55.053
Modified: 2025-12-11T18:13:32.750
Link: CVE-2025-34256
No data.