Published:2025/12/16 Last Updated:2025/12/16
JVNVU#92827367
Multiple vulnerabilities in CHOCO TEI WATCHER mini
Overview
CHOCO TEI WATCHER mini provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities.
Products Affected
- CHOCO TEI WATCHER mini (IB-MCT001) all versions
Description
CHOCO TEI WATCHER mini provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities listed below.
- Clickjacking (CWE-1021)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 5.1
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score 4.3 - CVE-2025-59479
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 5.1
- Improper check for unusual conditions (CWE-754)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Base Score 8.7
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Base Score 7.5
- CVE-2025-61976
- Improper check for unusual conditions (CWE-754)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N Base Score 6.9
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Base Score 5.3
- CVE-2025-66357
Impact
- If a user clicks on content on a malicious web page while logged into the product, unintended operations may be performed on the product (CVE-2025-59479)
- If a remote attacker sends a specially crafted request to the Video Download interface, the system may become unresponsive (CVE-2025-61976)
- When the Video Download feature is in a specific communication state, the product's resources may be consumed abnormally (CVE-2025-66357)
Solution
Apply the Workaround
The following workaround could mitigate the impacts of these vulnerabilities.
- Use the product within LAN and restrict access from untrusted networks and hosts
- Use a firewall or virtual private network (VPN) to prevent unauthorized access and restrict internet access to a minimum when internet access is required
Vendor Status
| Vendor | Link |
| Inaba Denki Sangyo Co., Ltd. | Multiple Newly Identified Vulnerabilities in CHOCO TEI WATCHER mini (PDF, Text in Japanese) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
JTEKT ELECTRONICS Quality Control Dept. reported these vulnerabilities to Inaba Denki Sangyo Co., Ltd. and coordinated. After the coordination was completed, Inaba Denki Sangyo Co., Ltd. reported the case to JPCERT/CC to notify users of the solution through JVN.
Other Information
| JPCERT Alert |
|
| JPCERT Reports |
|
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
CVE-2025-59479 |
|
CVE-2025-61976 |
|
|
CVE-2025-66357 |
|
| JVN iPedia |
|