Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-64097

NervesHub has Insufficient Token Entropy that Allows Authentication Bypass via Brute Force
Back to all
CVE

CVE-2025-64097

NervesHub has Insufficient Token Entropy that Allows Authentication Bypass via Brute Force

NervesHub is a web service that allows users to manage over-the-air (OTA) firmware updates of devices in the field. A vulnerability present starting in version 1.0.0 and prior to version 2.3.0 allowed attackers to brute-force user API tokens due to the predictable format of previously issued tokens. Tokens included user-identifiable components and were not cryptographically secure, making them susceptible to guessing or enumeration. The vulnerability could have allowed unauthorized access to user accounts or API actions protected by these tokens. A fix is available in version 2.3.0 of NervesHub. This version introduces strong, cryptographically-random tokens using :crypto.strongrandbytes/1, hashing of tokens before database storage to prevent misuse even if the database is compromised, and context-aware token storage to distinguish between session and API tokens. There are no practical workarounds for this issue other than upgrading. In sensitive environments, as a temporary mitigation,

firewalling access to the NervesHub server can help limit exposure until an upgrade is possible.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
9.5
-
4.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
0
-
C
H
U
-

Related Resources

No items found.

References

https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64097.json, https://github.com/nerves-hub/nerveshubweb/pull/2024, https://github.com/nerves-hub/nerveshubweb/releases/tag/v2.3.0, https://github.com/nerves-hub/nerveshubweb/security/advisories/GHSA-m9vj-776q-vc8m, https://nvd.nist.gov/vuln/detail/CVE-2025-64097

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0.00052%
EPSS Percentile
0.1629%
Introduced Version
c065e81ddbc35b507a379b38076310a9e3c7866d
Fix Available
a493bbe8e830ef52d6d2f01cd7d6ad6d53b67fcb

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading