CVE-2025-13187
📋 TL;DR
This vulnerability in Intelbras ICIP 2.0.20 allows remote attackers to access plaintext admin credentials stored in the /xml/sistema/acessodeusuario.xml file. Attackers can exploit this to gain unauthorized administrative access to affected systems. Organizations using Intelbras ICIP 2.0.20 are affected.
💻 Affected Systems
- Intelbras ICIP
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, allowing data theft, system modification, and lateral movement within the network.
Likely Case
Unauthorized administrative access leading to configuration changes, data exfiltration, and potential ransomware deployment.
If Mitigated
Limited impact with proper network segmentation and credential rotation, though system remains vulnerable to credential theft.
🎯 Exploit Status
Exploit involves simple HTTP requests to access the vulnerable XML file containing plaintext credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
1. Check Intelbras website for security advisories
2. Apply any available patches for ICIP 2.0.20
3. Update to a newer version if available
🔧 Temporary Workarounds
Restrict access to vulnerable XML file
allConfigure web server to block access to /xml/sistema/acessodeusuario.xml
# For Apache: Add to .htaccess or virtual host config
<Files "acessodeusuario.xml">
Require all denied
</Files>
# For Nginx: Add to server block
location ~* /xml/sistema/acessodeusuario\.xml$ {
deny all;
}
Implement network access controls
linuxRestrict network access to ICIP management interface
# Example iptables rule to restrict access to specific IPs
iptables -A INPUT -p tcp --dport [ICIP_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [ICIP_PORT] -j DROP
🧯 If You Can't Patch
- Isolate affected systems in a segmented network zone with strict access controls
- Implement multi-factor authentication and regularly rotate administrative credentials
🔍 How to Verify
Check if Vulnerable:
Attempt to access http://[target_ip]/xml/sistema/acessodeusuario.xml and check if it returns plaintext credentials
Check Version:
Check ICIP web interface or configuration files for version information
Verify Fix Applied:
Verify the XML file is no longer accessible or contains encrypted/hashed credentials
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /xml/sistema/acessodeusuario.xml
- Unusual authentication attempts from new IP addresses
- Multiple failed login attempts followed by successful admin login
Network Indicators:
- HTTP GET requests to vulnerable XML file path
- Traffic to ICIP management interface from unexpected sources
SIEM Query:
source="web_logs" AND (uri="/xml/sistema/acessodeusuario.xml" OR (status=200 AND uri LIKE "%/acessodeusuario.xml%"))
🔗 References
- https://vuldb.com/?ctiid.332475
- https://vuldb.com/?id.332475
- https://vuldb.com/?submit.685522
- https://www.notion.so/eldruin/Intelbras-ICIP-Plaintext-Admin-Credentials-Disclosure-29b27474cccb80ff943ff2776d03d7cd
- https://www.notion.so/eldruin/Intelbras-ICIP-Plaintext-Admin-Credentials-Disclosure-CVE-2025-13187-29b27474cccb80ff943ff2776d03d7cd