Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-6077

Summary
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
Published At-02 Aug, 2025 | 02:15
Updated At-03 Nov, 2025 | 20:06
Rejected At-
Credits

CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:certcc
Assigner Org ID:37e5125f-f79b-445b-8fad-9564f167944b
Published At:02 Aug, 2025 | 02:15
Updated At:03 Nov, 2025 | 20:06
Rejected At:
▼CVE Numbering Authority (CNA)
CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

Affected Products
Vendor
Partner Software
Product
Partner Web
Versions
Affected
  • From 4.32 before 4.32.2 (custom)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-1391
Type: N/A
CWE ID: N/A
Description: CWE-1391
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://partnersoftware.com/resources/software-release-info-4-32/
N/A
Hyperlink: https://partnersoftware.com/resources/software-release-info-4-32/
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-1391CWE-1391 Use of Weak Credentials
Type: CWE
CWE ID: CWE-1391
Description: CWE-1391 Use of Weak Credentials
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://kb.cert.org/vuls/id/317469
N/A
https://www.kb.cert.org/vuls/id/317469
N/A
Hyperlink: https://kb.cert.org/vuls/id/317469
Resource: N/A
Hyperlink: https://www.kb.cert.org/vuls/id/317469
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cret@cert.org
Published At:02 Aug, 2025 | 03:15
Updated At:03 Nov, 2025 | 20:19

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1391Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-1391
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://partnersoftware.com/resources/software-release-info-4-32/cret@cert.org
N/A
https://kb.cert.org/vuls/id/317469af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.kb.cert.org/vuls/id/317469af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://partnersoftware.com/resources/software-release-info-4-32/
Source: cret@cert.org
Resource: N/A
Hyperlink: https://kb.cert.org/vuls/id/317469
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.kb.cert.org/vuls/id/317469
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2026-22886
Matching Score-4
Assigner-Eclipse Foundation
ShareView Details
Matching Score-4
Assigner-Eclipse Foundation
CVSS Score-9.8||CRITICAL
EPSS-Not Assigned
Published-03 Mar, 2026 | 09:18
Updated-03 Mar, 2026 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-Eclipse OpenMQ
CWE ID-CWE-1391
Use of Weak Credentials
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-1393
Use of Default Password
CVE-2024-51978
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-9.8||CRITICAL
EPSS-48.34% / 97.69%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 07:17
Updated-25 Jul, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass via default password generation affecting multiple models from Brother Industries, Ltd, Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

Action-Not Available
Vendor-Konica Minolta, Inc.Brother Industries, LtdToshiba Tec
Product-HL-L2865DWHL-L2360DNDCP-L2531DWDCP-J4543NHL-1210WRHL-L2400DWEDCP-B7578DWHL-L1232WMFC-L2717DWDCP-L6600DWMFC-7895DWMFC-J6580CDWMFC-J3930DWHL-L3240CDWDCP-T230HL-1218WMFC-L5802DWDCP-L2605DWMFC-J1170DWADS-3300Wbizhub 5020iMFC-L8690CDWMFC-J5340DWMFC-J5345DWHL-L2371DNPT-E550W (for Russia)MFC-B7810DWBMFC-L9570CDW(for Japan)DCP-L2540DWHL-L2340DWMFC-J3940DWHL-L2375DWRQL-1115NWBMFC-J1215WMFC-L6800DWDCP-L1632WDCP-L2640DWMFC-J1205W(XL)MFC-L5700DWHL-L6410DNDCP-L3560CDWDCP-L2520DWDCP-L5510DNDCP-L5500DNDCP-J982N-W/BDCP-T420WDCP-J4143NHL-L2350DWMFC-L2800DWMFC-J6730DWMFC-L2710DWRDCP-T435WDCP-L2627DWHL-L3300CDWHL-L2461DNMFC-L2860DWHL-B2150WMFC-L2860DWEMFC-J5845DW(XL)PT-P750WMFC-L6810DWPT-E550W (for Vietnum)MFC-J4345DW XLMFC-L5717DWDCP-L2627DWXLMFC-L2880DWDCP-L3555CDWHL-L3215CWMFC-9150CDNMFC-L6702DWDCP-C1210NHL-L6200DWMFC-J6955DWRJ-3150AiDCP-L3510CDWMFC-L2751DWDCP-B7640DWBDCP-L3551CDWHL-L2357DWTD-2350DDCP-T530DWHL-L6210DWSP-1 (for Japan)HL-L6412DWDCP-L2627DWEMFC-J1605DNDCP-1623WRDCP-9030CDNDCP-L2647DWMFC-L5800DWHL-L6400DWGMFC-L5850DWMFC-J4340DW(XL)HL-L2366DWDCP-T226DCP-1610WEMFC-J4443NMFC-L5715DNMFC-J939DNTJ-4121TNRPT-D800WHL-L6300DWMFC-J5335DWMFC-T810W(for China)DCP-1610WDCP-T825DWHL-L2465DWMFC-L8610CDW(for Japan)MFC-L5900DWHL-L9310CDWDCP-B7620DWADS-1250WMFC-L5715DWMFC-L8395CDWHL-L2385DWMFC-J1012DWQL-810WHL-L6415DWTJ-4020TNDCP-1618WHL-L5210DWTHL-L2390DWMFC-L6912DWNFC-EX670HL-L3220CWDCP-L1848WMFC-L2817DWTD-4750TNWBRTJ-4021TNMFC-L5702DWHL-B2158WDCP-L2551DWNFC-J903NMFC-J497DWDCP-B7658DWPT-E550W (for US, EU)HL-L6402DWPT-P950NWMFC-J904NMFC-J939DWNDCP-L5652DNMFC-L8900CDWMFC-L2900DWXLMFC-L8340CDWMFC-7889DWDCP-1616NWDCP-J572NHL-L2360DWRJ-3150HL-L2351DWDCP-J981NDCP-J988NHL-L2350DWRTD-2350DFSAHL-3190CDWHL-L6217DWHL-L6450DWMFC-L2802DNMFC-L5750DWDCP-L5518DNHL-L2425DWTD-2125NQL-1110NWBcDCP-B7620DWBMFC-L9635CDNDCP-J572DWDCP-1612WDCP-L3550CDWMFC-J2730DWMFC-L2820DWXLMFC-L5700DNMFC-J738DWNDCP-L2552DNMFC-L6700DWTD-2310DHL-L5228DWDCP-L2665DWDCP-T220MFC-L5728DWDCP-L8410CDWMFC-1915WDCP-L2550DWQL-810WcMFC-L2900DWDCP-L5600DNMFC-J7100CDWHL-J6000DWMFC-J995DW XLDCP-L3520CDWMFC-L3735CDNDCP-J1140DWHL-L2386DWMFC-L2827DWXLHL-L1230WMFC-J4540NDCP-L2535DWRJ-4250WBMFC-L8610CDWHL-J6000CDWHL-L1808WDCP-J914NMFC-J690DWMFC-L2805DWHL-L8360CDWADS-2400NRJ-3035BMFC-J815DW XLHL-L2460DWXLDCP-L5610DNHL-5595DNHMFC-L2732DWMFC-L8390CDWMFC-J491DWRJ-2050TD-2120NMFC-L2713DWDCP-L2620DWHL-L2440DWDCP-J1200WEDCP-L1638WMFC-L9577CDWMFC-1910WDCP-T536DWHL-L9430CDNMFC-EX670WPT-E850TKW (for Asia pacific, EU, US)MFC-L2750DWRDCP-B7638DNDCP-L2520DWRDCP-J577NTD-2130NDCP-L3515CDWDCP-B7648DWHL-L2480DWMFC-L2685DWMFC-1916NWMFC-L2886DWMFC-L2707DWHL-EX415DWDCP-J972NHL-L8245CDWRJ-2150MFC-J6930DWHL-L6300DWTHL-L2375DWMFC-T910DWbizhub 5000iMFC-L6902DWPT-E550W (for Thailand)MFC-L2861DWMFC-L2720DWRMFC-8540DNTJ-4422TNDCP-1610WRHL-1222WEDCP-T439WQL-1110NWBHL-L2447DWMFC-L9630CDNDCP-L2625DWPT-E850TKW (for UAE)HL-L3220CWEHL-L5102DWMFC-J890DWTD-4520DNPT-P900WcHL-L6415DNHL-L9470CDNMFC-J905NDCP-7090DWMFC-J893NDCP-7190DNDCP-7195DWHL-L2400DWPT-E850TKW (for China)MFC-J5930DWDCP-7189DWHL-L6202DWMFC-B7800DNMFC-J1300DWHL-L6210DWTDCP-L2532DWTJ-4121TNMFC-J6945DWDCP-T525WMFC-J4540DW(XL)DCP-L2550DNMFC-J4440NMFC-L5718DNDCP-L2640DNHL-2560DNHL-EX470WMFC-L2730DNMFC-L3780CDWDCP-T735DWHL-L2360DNRHL-L6400DWTMFC-L5912DWHL-5590DNHL-L2370DNRDCP-J987N-BMFC-T4500DWHL-B2100DPT-E850TKW (for Koria)MFC-J739DNHL-L2340DWRMFC-L2730DWMFC-J6959DWMFC-L6710DWMFC-L6970DWMFC-L5710DWDCP-J4140Nbizhub 4000iHL-L2467DWVC-500WDCP-B7558WMFC-J2330DWHL-L3290CDWADS-4700WHL-2569DWMFC-L2827DWMFC-L6900DWMFC-J1500NMFC-J805DWHL-L3270CDWHL-1223WEMFC-1919NWDCP-J528NMFC-J4335DW(XL)MFC-L2770DWHL-L5210DNMFC-T925DWDCP-T820DWTJ-4021TNRHL-L6200DWTTD-4420DNZMFC-L2802DWDCP-B7608WDCP-L2540DNDCP-L2537DWTJ-4005DNMFC-J6555DW XLDCP-J928N-WBMFC-L2690DWHL-L2325DWMFC-L2771DWDCP-B7535DWDCP-L2550DNRMFC-1911WMFC-J6555DWMFC-L3740CDWMFC-L3740CDWEMFC-L2880DWXLTD-4650TNWBRPT-E550W (for China)MFC-J6983CDWMFC-L6915DNMFC-L6950DWHL-J7010CDWHL-L5200DWTHL-1212WRHL-1212WEMFC-J5730DWDCP-T238MFC-1912WRDCP-L5510DWHL-L2460DWHL-L2380DWMFC-J6530DWHL-L2352DWMFC-7880DNTD-2320DSADCP-L2660DWDCP-J772DWHL-L2315DWHL-2590DNMFC-J6540DWEMFC-L2710DNMFC-B7715DWMFC-L3730CDNTD-2135NRJ-2035BMFC-L2980DWDCP-B7530DNDCP-L2551DNDCP-T830DWQL-820NWBHL-B2100DBDCP-B7600DBDCP-B7548WDCP-C421WMFC-L5710DNMFC-L2885DWMFC-L2705DWRJ-3050HL-B2080DWMFC-1910WEHL-L3280CDWMFC-L5755DWMFC-J6940DWDCP-L2540DNRMFC-J998DWNDCP-1615NWMFC-B7810DWTD-4550DNWBHL-L6400DWHL-T4000DWMFC-B7811DWADS-3600WHL-L3295CDWDCP-T710W(for China)DCP-L2560DWRDCP-L2622DWHL-L5212DWTJ-4420TNMFC-L2806DWDCP-J1200W(XL)MFC-T810WDCP-T520WHL-JF1MFC-L6910DNMFC-J895DWMFC-L2701DWTJ-4520TNHL-L3230CDNMFC-J5945DWMFC-L2715DWDCP-J1200NPT-E850TKW (for Vietnum)MFC-J738DNDCP-L2530DWHL-L2405WMFC-J5330DWHL-B2181DWDCP-T225DCP-J1203NADS-4900WHL-L2372DNMFC-L2700DNHL-L8240CDWHL-L8260CDNMFC-J5955DWDCP-L5650DNMFC-J6997CDWMFC-L2710DWHL-L6250DNDCP-7190DWPJ-773MFC-L2740DWDCP-T730DWFAX-L2710DNMFC-J5855DWMFC-J1800DWMFC-L2716DWHL-L5215DNMFC-T935DWADS-2800WHL-L5100DNTMFC-L6900DWGDCP-L3568CDWDCP-B7650DWDCP-L2600DWTJ-4010TNMFC-J4940DNMFC-L2862DWHL-L2464DWMFC-L3710CDWMFC-J6999CDWHL-L2475DWHL-1211WHL-L2370DWXLTD-2350DFMFC-7890DNDCP-T436WMFC-T920DWHL-L8260CDWTD-4420TNDCP-L3520CDWETD-4420DNHL-L2395DWHL-L6418DWHL-L5202DWMFC-J5800CDWHL-L2365DWMFC-T930DWHL-L2365DWRDCP-1617NWMFC-J6947DWQL-820NWBcHL-L8360CDWTMFC-L2922DWDCP-L3517CDWADS-1700WMFC-J6995CDWMFC-L2750DWDCP-L2648DWMFC-L3770CDWMFC-L2700DW(ASA)DCP-T428WHL-1223WRDCP-J973N-W/BFAX-L2800DWMFC-J5630CDWMFC-L3760CDWMFC-L6915DN CSPHL-L2420DWMFC-L2700DWRMFC-L3720CDWMFC-8530DNRJ-3050AiMFC-J739DWNMFC-L9610CDNDCP-J987N-WDCP-L1630WHL-L8230CDWDCP-T510W(for China)DCP-J1800NHL-L2460DNMFC-L2700DWMFC-J1010DWMFC-J7600CDWDCP-L5602DNDCP-T535DWDCP-L2518DWHL-L1238WMFC-J805DW XLRJ-3250WBMFC-L2715DW(for Tiwan, Koria)TJ-4620TNHL-L3220CDWMFC-L2820DWHL-L5215DWDS-740DMFC-1911NWHL-L2376DWDCP-1622WEADS-4300NMFC-J6583CDWDCP-J1050DWHL-1212WHL-L9410CDNMFC-J6935DWDCP-T430WMFC-L3750CDWMFC-J7700CDWDCP-J1800DWDCP-T236MFC-J6535DWMFC-L3745CDWPT-E550W (for Koria)HL-L5050DNMFC-L3768CDWHL-L3230CDWTJ-4120TNMFC-L2835DWMFC-L9570CDWMFC-L2920DWADS-2700WeMFC-L6915DWHL-L5218DNMFC-L2720DNMFC-L3765CDWHL-B2180DWBDCP-B7520DWPT-E800WHL-3160CDWMFC-L2765DWMFC-J5830DWDCP-T510WMFC-L5915DWHL-1210WMFC-L2710DNRMFC-L2740DWRDCP-T720DWMFC-J5855DW XLDCP-L2560DWTD-4650TNWBHL-J6100DWMFC-L2680WDCP-L5502DNDCP-7180DNbizhub 4020iMFC-4340DWETD-2320DFMFC-EX915DWDCP-1623WEMFC-J6540DWMFC-L2703DWPJ-883HL-L2445DWADS-1350WMFC-J998DNHL-L6415DWTMFC-L2760DWADS-2700WDS/MDS-940DWHL-L5210DWPT-E550W (for Tiwan, Hongkong)HL-J6010DWHL-L5212DNDCP-L2508DWDCP-L2628DWMFC-L2720DWHL-L5100DNDCP-J915NMFC-L2750DWXLHL-L2370DWMFC-J3540DWDCP-L5662DNTJ-TJ-4522TNTD-2320DDCP-L2541DWe-STUDIO302DNFMFC-J3530DWMFC-J898NHL-5595DNPT-E850TKW (for Tiwan)HL-L3228CDWMFC-L2712DWDCP-T426WDCP-J582NHL-1210WEHL-B2188DWMFC-J4535DW(XL)DCP-L5660DNMFC-L2712DNMFC-L3755CDWMFC-J6740DWMFC-L2960DWMFC-J5740DWMFC-L2807DWDCP-J526NMFC-L2730DWRHL-L2370DNHL-B2180DWHL-L3288CDWMFC-J2740DWPT-E850TKW (for Thailand)HL-L6310DWRJ-2140MFC-EX910DCP-B7600DHL-2595DWMFC-L5902DWMFC-J4440DWFAX-L2700DNMFC-J6980CDWHL-L3210CWMFC-J995DWMFC-L6820DWMFC-J7300CDWDCP-B7640DWMFC-J7500CDWMFC-J5340DWEDCP-L3528CDWDCP-1612WRDCP-L2548DWMFC-J2340DWMFC-9350CDWMFC-J926N-WBe-STUDIO301DNDCP-J978N-W/BHL-L6415DN CSPDCP-L2680DWTD-4750TNWBDCP-J587NHL-L6250DWTD-4520TNDCP-L2600DHL-B2050DNSP-1MFC-L6750DWDCP-J1700DWADS-1800WDCP-T725DWTD-2350DSAMFC-L9670CDNDCP-B7628DWDCP-J774DWHL-L5200DWMFC-B7720DNDCP-L5512DNDCP-T425WDCP-T710WDCP-1612WEHL-L2305WMFC-L6720DWDCP-T835DWDCP-L2530DWRADS-3000NMFC-J6957DWPT-P900WADS-4500WDCP-L2550DW(TWN)DCP-J1100DW
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2023-0635
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.72%
||
7 Day CHG+0.03%
Published-05 Jun, 2023 | 03:42
Updated-08 Jan, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation to root

Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.

Action-Not Available
Vendor-ABB
Product-nexus-264-amatrix-11_firmwarematrix-264_firmwarematrix-232nexus-2128-g_firmwarenexus-264nexus-2128-aaspect-ent-96nexus-2128-gnexus-264_firmwarenexus-2128_firmwarenexus-2128-fnexus-264-a_firmwarenexus-2128-a_firmwarematrix-216matrix-296_firmwarematrix-216_firmwareaspect-ent-256nexus-3-264_firmwareaspect-ent-12aspect-ent-256_firmwarematrix-11nexus-264-faspect-ent-2_firmwarenexus-264-g_firmwarenexus-264-f_firmwarenexus-2128nexus-3-2128nexus-3-2128_firmwarematrix-232_firmwarenexus-264-gaspect-ent-12_firmwarematrix-296aspect-ent-2nexus-2128-f_firmwarenexus-3-264aspect-ent-96_firmwarematrix-264MATRIX SeriesNEXUS SeriesASPECT®-Enterprise
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2025-30519
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.42%
||
7 Day CHG+0.01%
Published-18 Sep, 2025 | 20:46
Updated-19 Sep, 2025 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dover Fueling Solutions ProGauge MagLink LX4 Devices Use of Weak Credentials

Dover Fueling Solutions ProGauge MagLink LX4 Devices have default root credentials that cannot be changed through standard administrative means. An attacker with network access to the device can gain administrative access to the system.

Action-Not Available
Vendor-Dover Fueling Solutions
Product-ProGauge MagLink LX PlusProGauge MagLink LX 4ProGauge MagLink LX Ultimate
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2024-43698
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.14% / 34.16%
||
7 Day CHG~0.00%
Published-22 Oct, 2024 | 21:23
Updated-23 Oct, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kieback&Peter DDC4000 Series Use of Weak Credentials

Kieback & Peter's DDC4000 series uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.

Action-Not Available
Vendor-Kieback&Peterkieback\&peter
Product-DDC4400eDDC4002DDC4100DDC4400DDC4200-LDDC4040eDDC4020eDDC4200eDDC4200DDC4002eddc4200e_firmwareddc4002e_firmwareddc4100_firmwareddc4400e_firmwareddc4200_firmwareddc4400_firmwareddc4040e_firmwareddc4002_firmwareddc4020e_firmwareddc4200-l_firmware
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2024-12728
Matching Score-4
Assigner-Sophos Limited
ShareView Details
Matching Score-4
Assigner-Sophos Limited
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.53%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 20:48
Updated-12 Nov, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3 (20.0.3).

Action-Not Available
Vendor-Sophos Ltd.
Product-firewallfirewall_firmwareSophos Firewall
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2023-31240
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.3||HIGH
EPSS-0.07% / 21.16%
||
7 Day CHG~0.00%
Published-22 May, 2023 | 19:58
Updated-16 Jan, 2025 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.

Action-Not Available
Vendor-snaponeSnap One
Product-orvcOvrC Cloud
CWE ID-CWE-1391
Use of Weak Credentials
Details not found