GatesAir Flexiva-LX devices on firmware 1.0.13 and 2.0, including models LX100, LX300, LX600, and LX1000, expose sensitive session identifiers (sid) in the publicly accessible log file located at /log/Flexiva%20LX.log. An unauthenticated attacker can retrieve valid session IDs and hijack sessions without providing any credentials. This attack requires the legitimate user (admin) to have previously closed the browser window without logging out.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63212%20_GatesAir%20Flexiva-LX%20Series%20_%20Session%20Hijacking | Exploit Third Party Advisory |
| https://www.gatesair.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-19 20:15
Updated : 2026-01-15 18:31
NVD link : CVE-2025-63212
Mitre link : CVE-2025-63212
CVE.ORG link : CVE-2025-63212
JSON object : View
Products Affected
gatesair
- flexiva_lx100_firmware
- flexiva_lx600_firmware
- flexiva_lx100
- flexiva_lx300
- flexiva_lx1000
- flexiva_lx600
- flexiva_lx1000_firmware
- flexiva_lx300_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
