An unauthenticated user with management network access can get and 
modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) 
configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration
and execute some commands (e.g., system reboot).
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3498 | 
                     | 
            
History
                    Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Wed, 09 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 09 Jul 2025 09:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An unauthenticated user with management network access can get and modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration and execute some commands (e.g., system reboot). | |
| Title | Unauthenticated modification of Radiflow iSAP Smart Collector configuration | |
| Weaknesses | CWE-306 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: ENISA
Published: 2025-07-09T08:53:32.653Z
Updated: 2025-07-09T13:20:55.438Z
Reserved: 2025-04-10T08:40:13.779Z
Link: CVE-2025-3498
Updated: 2025-07-09T13:12:59.132Z
Status : Awaiting Analysis
Published: 2025-07-09T09:15:27.137
Modified: 2025-07-10T13:17:30.017
Link: CVE-2025-3498
No data.