🔐 CVE Alert

CVE-2025-34256

UNKNOWN 0.0

Advantech WISE-DeviceOn Server < 5.4 Hard-coded JWT Key Authentication Bypass

CVSS Score
0.0
EPSS Score
0.3%
EPSS Percentile
53th

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.

CWE CWE-321
Vendor advantech co., ltd.
Product wise-deviceon server
Published Dec 5, 2025
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for advantech co., ltd. wise-deviceon server

Be the first to know when new unknown vulnerabilities affecting advantech co., ltd. wise-deviceon server are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Advantech Co., Ltd. / WISE-DeviceOn Server
0 < 5.4.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
advcloudfiles.advantech.com: https://advcloudfiles.advantech.com/cms/2ca1b071-fd78-4d7f-8a2a-7b4537a95d19/Security%20Advisory%20PDF%20File/SECURITY-ADVISORY----DeviceOn-20251208-2.pdf pellera.com: https://pellera.com/blog/advantech-wise-deviceon-cve-2025-34256-vulnerability/ docs.deviceon.advantech.com: https://docs.deviceon.advantech.com/docs/resource/ vulncheck.com: https://www.vulncheck.com/advisories/advantech-wise-deviceon-server-hardcoded-jwt-key-authentication-bypass

Credits

Alex Williams from Pellera Technologies