• Cyber Security

Critical Microsens Flaws Enable Unauthorized System Control

5 minute read

By Tech Icons
1:51 pm
Save
Image credits: Shutterstock.com

Critical industrial software vulnerabilities in Microsens management platform enable attackers to gain complete system control without credentials

Key Takeaways

  • Critical vulnerabilities with 9.3 CVSS scores in Microsens NMP Web+ allow hackers to bypass authentication and execute remote code without prior system access
  • Chained exploit creates “zero to hero” attack path enabling full system control at OS level through forged authentication tokens and file overwriting capabilities
  • Global industrial exposure with immediate patches available as CISA warns of internet-accessible instances while Microsens releases version 3.3.0 updates for Windows and Linux

Introduction

Critical vulnerabilities in industrial network management software have created a pathway for hackers to gain complete system control without authentication. The Cybersecurity and Infrastructure Security Agency disclosed severe flaws in Microsens NMP Web+ that allow remote attackers to forge authentication tokens and execute arbitrary code.

These vulnerabilities affect organizations globally using the German company’s network management platform for industrial switches and automation equipment. The disclosure highlights growing security risks in connected industrial systems as companies digitize critical infrastructure operations.

Key Developments

CISA’s advisory reveals two critical vulnerabilities and one high-severity flaw in Microsens NMP Web+. The most dangerous combination involves CVE-2025-49151, which enables authentication bypass through forged JSON Web Tokens, and CVE-2025-49153, allowing file overwriting for code execution.

Vulnerability researcher Noam Moshe from Claroty’s Team82 discovered these flaws can be chained together for maximum impact. The first vulnerability generates valid authentication tokens while the second permits file manipulation, creating a complete attack pathway.

Microsens has released patches in version 3.3.0 for both Windows and Linux platforms. The German Federal Office for Information Security supported coordination efforts to address the vulnerabilities across affected systems.

Market Impact

The vulnerabilities carry CVSS v4 scores of 9.1 to 9.3 out of 10, placing them in the most critical threat category. Security experts rank these flaws in the top 27th percentile of all scored vulnerabilities for exploitation probability within 30 days.

Industrial automation companies face increased scrutiny as the global market approaches $200 billion by 2026. The disclosure pattern suggests heightened regulatory oversight and mandatory reporting requirements for critical infrastructure vulnerabilities.

Customer response includes immediate network restrictions and device disconnections until patches are applied. Industry analysts expect increased demand for third-party security audits and secure development practices across automation vendors.

Strategic Insights

The incident exposes fundamental security gaps in industrial connectivity products as companies balance operational efficiency with cybersecurity. Microsens faces potential contract losses and increased liability exposure, particularly among critical manufacturing clients where system integrity is paramount.

Competitive dynamics shift as security becomes a primary differentiator rather than a compliance requirement. Companies with robust security frameworks gain advantages in customer acquisition and retention, while those with vulnerabilities face market penalties.

The disclosure represents broader industry transformation toward mandatory security standards for industrial automation. SecurityWeek reports that CISA issued simultaneous advisories for equipment from Kaleris, Delta Electronics, and Schneider Electric, indicating systemic vulnerabilities across multiple vendors.

Expert Opinions and Data

Moshe emphasized the severity of the vulnerability chain, stating that these flaws allow attackers to “gain full control over the system without previous knowledge of the server’s credentials, effectively going from zero to hero.” This assessment reflects the worst-case scenario for industrial security breaches.

Security experts classify the authentication bypass capability as a textbook example of critical infrastructure vulnerability. The ability to achieve system-level access without prior credentials represents maximum threat potential for industrial environments.

CISA notes no current evidence of active exploitation, though multiple instances remain internet-accessible. The agency coordinates with German authorities and emphasizes immediate patching across affected industrial systems.

Conclusion

The Microsens vulnerabilities demonstrate the escalating security challenges facing industrial automation as connectivity expands attack surfaces. Companies must balance operational requirements with comprehensive security measures to protect critical infrastructure systems.

The incident reinforces the shift toward proactive vulnerability management and regulatory compliance in industrial sectors. Organizations using affected systems face immediate decisions about network access restrictions and patch deployment timelines to maintain operational security.

Related News

Cybersecurity M&A Deals Surge to 42 in May 2025

Read more

Cyberattack Forces Whole Foods Supplier to Shut Down Network Operations

Read more

The Insider Threat You Didn’t See Coming

Read more

China Accuses Taiwan of Running US-Backed Cyber Operations Network

Read more

Businesses Hit with $4.88M Loss Per Social Engineering Breach

Read more

Google Unveils New Multi-Layered Security to Block AI Threats

Read more

Cybersecurity News

View All

6M Qantas Customer Records Exposed in Call‑Centre Cyberattack

Read more

International Criminal Court Thwarts Major Cyberattack

Read more

Critical Microsens Flaws Enable Unauthorized System Control

Read more