CVE-2025-59392

6.8 MEDIUM

📋 TL;DR

This vulnerability allows physical attackers to reset the admin password on Elspec G5 devices by inserting a USB drive with a specific reset string. It affects all Elspec G5 devices running firmware versions through 1.2.2.19. This bypasses authentication controls and gives attackers administrative access.

💻 Affected Systems

Products:
  • Elspec G5 Multi-Functional Digital Fault Recorder
Versions: Through 1.2.2.19
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with firmware up to 1.2.2.19 are vulnerable by default. The reset string is publicly documented.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control over the device, potentially disrupting critical power grid monitoring/protection functions or using the device as an initial foothold in industrial control networks.

🟠

Likely Case

Unauthorized personnel with physical access reset admin credentials, gaining control over device configuration and potentially altering protection settings or accessing sensitive operational data.

🟢

If Mitigated

With proper physical security controls, the risk is limited to authorized personnel who could still misuse this capability.

🌐 Internet-Facing: LOW - This requires physical USB access, not network exploitation.
🏢 Internal Only: HIGH - Physical access to industrial control system devices in substations or facilities presents significant risk if devices are not physically secured.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical USB access and knowledge of the publicly documented reset string. No technical skills needed beyond creating the USB drive.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.2.2.19

Vendor Advisory: https://www.elspec-ltd.com/support/security-advisories/

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Elspec support portal. 3. Follow vendor's firmware update procedure for G5 devices. 4. Verify successful update and test functionality.

🔧 Temporary Workarounds

Physical USB Port Security

all

Disable or physically secure USB ports to prevent unauthorized USB insertion

Enhanced Physical Security

all

Implement strict physical access controls to device locations

🧯 If You Can't Patch

  • Implement strict physical security controls around all G5 devices including locked enclosures and access monitoring
  • Disable USB ports through physical means (USB port blockers, epoxy, etc.) and maintain strict USB device policies

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. If version is 1.2.2.19 or earlier, device is vulnerable.

Check Version:

Check via web interface at System > About, or via serial console using vendor-specific commands

Verify Fix Applied:

Verify firmware version is greater than 1.2.2.19. Test that USB password reset no longer works by attempting the documented procedure (in controlled environment).

📡 Detection & Monitoring

Log Indicators:

  • USB device insertion logs
  • Admin password reset events
  • Authentication failure followed by successful admin login

Network Indicators:

  • Unusual configuration changes from device
  • New administrative sessions from unexpected locations

SIEM Query:

source="elspec-g5" AND (event_type="usb_insertion" OR event_type="password_reset" OR (auth_result="failure" FOLLOWED BY auth_result="success" WITHIN 5m))

🔗 References

📤 Share & Export