Description

The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.

INFO

Published Date :

2025-10-31T13:42:32.743Z

Last Modified :

2025-11-03T15:51:03.421Z

Source :

S21sec
AFFECTED PRODUCTS

The following products are affected by CVE-2025-64386 vulnerability.

Vendors Products
Circutor
  • Tcprs1plus
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability