Description Preview
This CVE describes unauthorized exposure of confidential information affecting two Famatech products: Advanced IP Scanner (versions 2.5.4594.1 and earlier) and Advanced Port Scanner (versions 2.5.3869 and earlier). During network scans, these applications may transmit the NTLM hash of the user performing the scan, which can be captured by an eavesdropper on the network or by connecting to a malicious server. The exposure is relevant for both HTTP/HTTPS and SMB protocols and can be exploited in local or remote network contexts. The vulnerability is currently unpatched, with the vendor (Famatech Corp) actively working on a fix. Severity metrics indicate a medium overall impact (CVSS v4.0 base score 6.9; confidentiality impact HIGH; attack vector LOCAL; no privileges required; no user interaction).
Overview
This vulnerability involves the unauthorized exposure of a user’s NTLM hash during network scans initiated by Famatech’s Advanced IP Scanner and Advanced Port Scanner. An attacker could observe or capture the hash by monitoring traffic to a legitimate server or by coordinating with a malicious server, affecting both HTTP/HTTPS and SMB communications in local or remote network contexts. The issue has not yet been fixed, and the vendor is actively developing a remedy.
Remediation
- Monitor the vendor for a published patch or fixed version and apply the update as soon as it becomes available.
- If a patch is not yet available, restrict scanning to trusted, isolated networks and avoid performing scans on untrusted or public networks.
- Ensure communications are secured:
- Prefer HTTPS for all web interfaces and ensure TLS is correctly configured.
- Enable SMB signing and, where possible, SMB encryption to protect SMB traffic.
- Where feasible, favor authentication methods that do not rely on NTLM (e.g., Kerberos) and enforce NTLMv2 while disabling NTLMv1.
- Enforce network access controls:
- Segment networks to limit exposure of scanning traffic.
- Apply firewall rules to restrict scanning-related traffic to known, legitimate servers.
- Deploy endpoint and network monitoring to detect and alert on suspected credential exposure (e.g., unusual NTLM-related traffic or hashes appearing on the network).
- Consider temporarily using alternative, vendor-vetted scanning tools until a fix is released.
- Validate remediation by testing in a controlled environment after applying patches or mitigations.
References
- INCIBE advisory on Famatech Corp products: https://www.incibe.es/en/incibe-cert/notices/aviso/information-display-multiple-products-famatech-corp
- MITRE CVE entry: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1868
- NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2025-1868
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- ConstructionConstruction: Low
- Educational ServicesEducational Services: Low
- Finance and InsuranceFinance and Insurance: Low
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- ManufacturingManufacturing: Low
- MiningMining: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Public AdministrationPublic Administration: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Retail TradeRetail Trade: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- UtilitiesUtilities: Low
- Wholesale TradeWholesale Trade: Low