S4E

CVE-2025-13315 Scanner

CVE-2025-13315 Scanner - Information Disclosure vulnerability in Twonky Server

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

17 days 7 hours

Scan only one

URL

Toolbox

Twonky Server is used by both individual and enterprise-level users as a media server, allowing them to stream digital media content across various devices. It is ideally employed in home network environments to enable streaming across TVs, tablets, and computers, providing a central repository for media files. Designed for both Windows and Linux platforms, it facilitates ease of access and organization of digital media content. Twonky Server is prized for its ability to deliver content via DNLA/UPnP protocols, making it compatible with many devices. Its broad adoption is driven by its user-friendly interface and extensive device support. However, the expansive capabilities of Twonky Server may occasionally expose certain vulnerabilities if not robustly secured.

This vulnerability relates to a broken access control weakness permitting unauthenticated attackers to access sensitive administrative log files without proper authentication. It is linked with API authentication bypass, which simultaneously allows unauthorized reading of critical data. The exposed data includes administrator credentials, which may lead to further exploitation. Critical due to its unauthenticated nature, the flaw exists in Twonky Server 8.5.2 and poses a high risk to systems utilizing this version. Such security misconfigurations can be exploited remotely, giving attackers indirect access to sensitive parts of the system. The severity rests in how intruders can potentially bypass typical security mechanisms seamlessly.

The vulnerability hinges on a critical endpoint within the Twonky Server environment: '/nmc/rpc/log_getfile.' This endpoint improperly discloses administrative log data when accessed without authentication. Attackers exploit aspects of the server's API, particularly the log file retrieval mechanism, bypassing usual security verifications. The critical issue is originated from improper handling of access authorization, neglecting to validate user authenticity. Through this flaw, an exploit involves crafting a GET request that can reveal system logs containing vital access information. Log files obtained might contain usernames and encrypted passwords, mismanagement of which raises security alarms.

Should this vulnerability be exploited, unauthorized individuals would gain access to sensitive log files containing administrative details, presenting a high risk of further attacks. Disclosure of administrator usernames and encrypted passwords can lead to unauthorized access to server configurations. Compromised credentials might result in additional infiltration and manipulation of media server settings and stored content. This infiltration has diverse repercussions, including data corruption, unauthorized data dissemination, and potential service disruptions. The indirect impact could extend to compromised network devices due to the cascading effects of access misuse.

REFERENCES

Get started to protecting your digital assets