CVE-2025-13651 PUBLISHED

LEAK OF SENSITIVE INFORMATION ON MICROCOM'S ZEUSWEB

Assigner: HackRTU
Reserved: 25.11.2025 Published: 11.02.2026 Updated: 11.02.2026

Exposure of Sensitive System Information to an Unauthorized Actor vulnerability in Microcom ZeusWeb allows Web Application Fingerprinting of sensitive data. This issue affects ZeusWeb: 6.1.31.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor Microcom
Product ZeusWeb
Versions Default: unknown
  • Version 6.1.31 is affected

Solutions

The provider has implement the new version 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.

Credits

  • Aarón Flecha Menéndez finder
  • Víctor Bello Cuevas finder

References

Problem Types

  • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere CWE

Impacts

  • CAPEC-224 Fingerprinting
  • CAPEC-541 Application Fingerprinting
  • CAPEC-170 Web Application Fingerprinting