Güralp Systems FMUS Series and MIN Series Devices (Update B)
Güralp FMUS Series and MIN Series devices contain an authentication bypass vulnerability in their Telnet interface (CVE-2025-8286). An attacker can remotely connect without credentials and modify hardware configurations, manipulate measurement data, or factory reset the device. FMUS Series devices in all versions are not receiving a patch. MIN Series devices (Minimus-based, including Fortimus and Certimus) receive protection through experimental firmware v2.1-29897, which adds Telnet authentication requirements. Güralp recommends network-level mitigations including firewall restrictions, VPN for remote access, and avoiding direct Internet exposure.
- Network access to Telnet port 23 on the affected device
- Device is reachable from the attacker's network segment or the Internet if not firewalled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/58cecfcd-9acd-478a-ac05-bb07f30514f6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.