PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-24852 Inaba Denki Sangyo Co., Ltd. CVE debrief

CVE-2025-24852 describes a credential exposure issue in Inaba Denki Sangyo CHOCO TEI WATCHER mini (IB-MCT001). According to the advisory, an attacker who can access the device's microSD card may obtain the product's login password. The supplied remediation focuses on restricting physical/media access and limiting network exposure, rather than on a software patch.

Vendor
Inaba Denki Sangyo Co., Ltd.
Product
CHOCO TEI WATCHER mini (IB-MCT001)
CVSS
MEDIUM 4.6
CISA KEV
Not listed in stored evidence
Original CVE published
2025-03-25
Original CVE updated
2025-03-25
Advisory published
2025-03-25
Advisory updated
2025-03-25

Who should care

OT/industrial operators, site administrators, and technicians who deploy, service, or physically handle CHOCO TEI WATCHER mini (IB-MCT001), especially where microSD cards are used.

Technical summary

The advisory states that access to the product's microSD card may allow an attacker to obtain the login password. This is a local/physical exposure scenario tied to removable media handling, not a network-side remote code execution issue. The supplied CVSS vector reflects physical attack complexity with high confidentiality impact and no integrity or availability impact.

Defensive priority

Medium. Prioritize controls that reduce physical access to the device and its microSD cards, and apply network containment measures where the product is exposed beyond a trusted LAN.

Recommended defensive actions

  • Restrict the product operation, including the use and handling of microSD cards, to authorized users only.
  • Use the product within a LAN and block access from untrusted networks and hosts through firewalls.
  • If Internet access is required, place the product behind a firewall or VPN and restrict Internet access to the minimum necessary.
  • Review physical access controls for the device, its storage media, and any maintenance workflows that involve the microSD card.
  • Follow the linked CISA industrial control system recommended practices and the vendor/JVN guidance for additional hardening steps.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-084-04 and its source item, both published on 2025-03-25. The advisory description says an attacker who can access the microSD card used on the product may obtain the login password, and the remediation section recommends LAN containment, firewall/VPN use, and restricting microSD handling to authorized users. No vendor patch or fixed-version information is included in the supplied corpus.

Official resources

Publicly disclosed by CISA in ICS Advisory ICSA-25-084-04 on 2025-03-25; the source advisory and CVE record in the supplied timeline are both dated the same day.