Published:2025/12/16  Last Updated:2025/12/16

JVNVU#92827367
Multiple vulnerabilities in CHOCO TEI WATCHER mini

Overview

CHOCO TEI WATCHER mini provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities.

Products Affected

  • CHOCO TEI WATCHER mini (IB-MCT001) all versions

Description

CHOCO TEI WATCHER mini provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities listed below.

  • Clickjacking (CWE-1021)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 5.1
      CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score 4.3
    • CVE-2025-59479
  • Improper check for unusual conditions (CWE-754)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Base Score 8.7
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Base Score 7.5
    • CVE-2025-61976
  • Improper check for unusual conditions (CWE-754)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N Base Score 6.9
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Base Score 5.3
    • CVE-2025-66357

Impact

  • If a user clicks on content on a malicious web page while logged into the product, unintended operations may be performed on the product (CVE-2025-59479)
  • If a remote attacker sends a specially crafted request to the Video Download interface, the system may become unresponsive (CVE-2025-61976)
  • When the Video Download feature is in a specific communication state, the product's resources may be consumed abnormally (CVE-2025-66357)

Solution

Apply the Workaround
The following workaround could mitigate the impacts of these vulnerabilities.

  • Use the product within LAN and restrict access from untrusted networks and hosts
  • Use a firewall or virtual private network (VPN) to prevent unauthorized access and restrict internet access to a minimum when internet access is required
For more details, refer to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

JTEKT ELECTRONICS Quality Control Dept. reported these vulnerabilities to Inaba Denki Sangyo Co., Ltd. and coordinated. After the coordination was completed, Inaba Denki Sangyo Co., Ltd. reported the case to JPCERT/CC to notify users of the solution through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-59479
CVE-2025-61976
CVE-2025-66357
JVN iPedia