PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-4364 Assured Telematics Inc. CVE debrief

CVE-2025-4364 is a high-severity information exposure issue in Assured Telematics Inc. Fleet Management System. According to CISA, an unauthenticated attacker could access system information that may lead to sensitive file access and the disclosure of administrative credentials. CISA published the advisory on 2025-05-20 and later issued Update A on 2025-06-10; the vendor states the exposure has been fixed.

Vendor
Assured Telematics Inc.
Product
Fleet Management System
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-20
Original CVE updated
2025-06-10
Advisory published
2025-05-20
Advisory updated
2025-06-10

Who should care

Security teams, system administrators, and operators responsible for Assured Telematics Inc. Fleet Management System deployments, especially where the system is reachable from broader network segments.

Technical summary

The advisory describes a network-reachable, unauthenticated confidentiality issue (CVSS 3.1: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The affected product could reveal system information that may enable access to sensitive files and administrative credentials. The supplied CISA CSAF notes that Assured Telematics reports the sensitive-information exposure has been fixed, but no version-specific remediation is provided in the source corpus.

Defensive priority

HIGH

Recommended defensive actions

  • Apply the vendor-provided remediation or updated release for the affected Fleet Management System as soon as it is available for your environment.
  • Contact Assured Telematics for the exact fixed version or deployment guidance if you cannot confirm remediation from the advisory alone.
  • Restrict access to the Fleet Management System to trusted administrative networks and users only; do not leave the service broadly reachable.
  • Rotate administrative credentials and review access logs if there is any chance the exposed information was accessed.
  • Follow CISA ICS recommended practices and defense-in-depth guidance to reduce exposure and improve monitoring around OT/ICS assets.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-140-11 for CVE-2025-4364 and its referenced mitigation notes. The advisory states that an unauthenticated attacker could access system information that may enable further access to sensitive files and administrative credentials. The source metadata shows initial publication on 2025-05-20 and Update A on 2025-06-10. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, which aligns with a remote, no-auth, confidentiality-impacting issue.

Official resources

CISA published ICSA-25-140-11 on 2025-05-20 and issued Update A on 2025-06-10.