Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.
References
Configurations
History
11 Dec 2025, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Advantech wise-deviceon Server
Advantech |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:advantech:wise-deviceon_server:*:*:*:*:*:*:*:* | |
| References | () https://advcloudfiles.advantech.com/cms/2ca1b071-fd78-4d7f-8a2a-7b4537a95d19/Security%20Advisory%20PDF%20File/SECURITY-ADVISORY----DeviceOn.pdf - Vendor Advisory | |
| References | () https://docs.deviceon.advantech.com/docs/resource/ - Product | |
| References | () https://www.vulncheck.com/advisories/advantech-wise-deviceon-server-hardcoded-jwt-key-authentication-bypass - Third Party Advisory |
05 Dec 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-05 18:15
Updated : 2025-12-11 18:13
NVD link : CVE-2025-34256
Mitre link : CVE-2025-34256
CVE.ORG link : CVE-2025-34256
JSON object : View
Products Affected
advantech
- wise-deviceon_server
CWE
CWE-321
Use of Hard-coded Cryptographic Key
