PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-13084 Opto 22 CVE debrief

CVE-2025-13084 is a high-severity information exposure issue in Opto 22 groov View. According to the CISA advisory, the groov View API users endpoint can return a list of all users and associated metadata, including API keys. The endpoint requires an Editor role, but it can reveal API keys for all users, including Administrators. Opto 22 has released a fix and recommends upgrading affected systems.

Vendor
Opto 22
Product
groov View Server for Windows
CVSS
HIGH 7.6
CISA KEV
Not listed in stored evidence
Original CVE published
2025-11-25
Original CVE updated
2025-11-25
Advisory published
2025-11-25
Advisory updated
2025-11-25

Who should care

Organizations running Opto 22 groov View Server for Windows or GRV-EPIC firmware, especially teams with Editor-role users, administrators, or exposed industrial control system management interfaces.

Technical summary

The advisory describes a users endpoint in the groov View API that discloses user records and associated metadata, including API keys. Access to the endpoint is gated by the Editor role, but successful access can expose keys for all users, including Administrator accounts. The supplied CVSS vector indicates network attackability with low attack complexity, low required privileges, no user interaction, and high confidentiality impact.

Defensive priority

High. This vulnerability can expose privileged API keys and should be addressed promptly wherever groov View is deployed, especially in environments that rely on API keys for administrative or operational access.

Recommended defensive actions

  • Upgrade groov View Server for Windows to Version R4.5e.
  • Upgrade GRV-EPIC Firmware to Version 4.0.3.
  • Review which accounts have the Editor role and limit that role to the smallest necessary set of users.
  • Rotate or revoke any API keys that may have been exposed through the endpoint.
  • Audit logs and access records for unexpected use of the users endpoint or related administrative activity.
  • Validate that affected systems are reachable only from trusted management networks and follow CISA industrial control systems defensive guidance.

Evidence notes

All core claims are taken from the CISA CSAF advisory and its remediation entry. The advisory states that the groov View API users endpoint returns user metadata including API keys and that it requires an Editor role. The remediation section states Opto 22 published a patch and recommends upgrading to groov View Server for Windows Version R4.5e and GRV-EPIC Firmware Version 4.0.3. No exploit steps or unsupported details are included.

Official resources

CISA published the advisory on 2025-11-25 with the initial revision recorded the same day. The advisory identifies Opto 22 as the vendor and states that a vendor patch is available.