Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-27785

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-27 Apr, 2026 | 23:38
Updated At-28 Apr, 2026 | 12:40
Rejected At-
Credits

Milesight Cameras Use of Hard-coded Credentials

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:27 Apr, 2026 | 23:38
Updated At:28 Apr, 2026 | 12:40
Rejected At:
▼CVE Numbering Authority (CNA)
Milesight Cameras Use of Hard-coded Credentials

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

Affected Products
Vendor
MilesightMilesight
Product
MS-Cxx63-PD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx64-xPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx73-xPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx75-xxPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx83-xPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx74-PA
Default Status
unaffected
Versions
Affected
  • From 0 through 3x.8.0.3-r11 (custom)
Vendor
MilesightMilesight
Product
MS-C8477-HPG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r3 (custom)
Vendor
MilesightMilesight
Product
MS-C8477-PC
Default Status
unaffected
Versions
Affected
  • From 0 through 48.8.0.4-r3 (custom)
Vendor
MilesightMilesight
Product
MS-C5321-FPE
Default Status
unaffected
Versions
Affected
  • From 0 through 62.8.0.4-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx62-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx52-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxGPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx61-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx67-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx71-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx41-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx76-PE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx65-PE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.5-r3 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx62-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.5-r3 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.5-r3 (custom)
Vendor
MilesightMilesight
Product
MS-CQxx31-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through CQ_63.8.0.5-r1 (custom)
Vendor
MilesightMilesight
Product
MS-CQxx68-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through CQ_63.8.0.5-r1 (custom)
Vendor
MilesightMilesight
Product
MS-CQxx72-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through CQ_63.8.0.5-r1 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-NxE
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxC
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxE
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxG
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxH
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxT
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
PMC8266-FPE
Default Status
unaffected
Versions
Affected
  • From 0 through PO_61.8.0.4_LPR (custom)
Vendor
MilesightMilesight
Product
PMC8266-FGPE
Default Status
unaffected
Versions
Affected
  • From 0 through PO_61.8.0.4_LPR (custom)
Vendor
MilesightMilesight
Product
PM3322-E
Default Status
unaffected
Versions
Affected
  • From 0 through PI_61.8.0.3_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RIPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5366-X12RIPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4RIPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-RFIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4RIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-RFIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RIWG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4RIWG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5510-GVH
Default Status
unaffected
Versions
Affected
  • From 0 through T_47.8.0.4_LPR-r7 (custom)
Vendor
MilesightMilesight
Product
TS5510-GH
Default Status
unaffected
Versions
Affected
  • From 0 through T_47.8.0.4_LPR-r6 (custom)
Vendor
MilesightMilesight
Product
TS5511-GVH
Default Status
unaffected
Versions
Affected
  • From 0 through T_47.8.0.4_LPR-r6 (custom)
Vendor
MilesightMilesight
Product
TS2966-X12TPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5366-X12PE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4PE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS2966-X12TVPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RVPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5366-X12VPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4VPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4441-X36RPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4441-X36RE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RWE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4WE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
MS-C2964-RFLPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2972-RFLPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2966-RFLWPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2866-X4TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2866-X4TVPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2866-X4TGPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2841-X36TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2841-X36TPC/W
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2867-X5TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2961-X12TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS8266-FPC/P
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2966-X12RLPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2966-X12RLVPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C5366-X12LPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C5366-X12LVPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C5361-X12LPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxxGOPC
Default Status
unaffected
Versions
Affected
  • From 0 through 45.8.0.2-AIoT-r4 (custom)
Vendor
MilesightMilesight
Product
SC211
Default Status
unaffected
Versions
Affected
  • From 0 through C_21.1.0.8-r4 (custom)
Vendor
MilesightMilesight
Product
SP111
Default Status
unaffected
Versions
Affected
  • From 0 through 52.8.0.4-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-RFIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-RFIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-FIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-FIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Problem Types
TypeCWE IDDescription
CWECWE-798CWE-798
Type: CWE
CWE ID: CWE-798
Description: CWE-798
Metrics
VersionBase scoreBase severityVector
4.07.7HIGH
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Milesight advises all users to update their device to the latest firmware versions of PE/PC/PA found at https://www.milesight.com/support/download/firmware.  https://www.milesight.com/support/download/firmware MS-Cxx63-PD: Update to 51.7.0.77-r13 MS-Cxx64-xPD: Update to 51.7.0.77-r13 MS-Cxx73-xPD: Update to 51.7.0.77-r13 MS-Cxx75-xxPD: Update to 51.7.0.77-r13 MS-Cxx83-xPD: Update to 51.7.0.77-r13 MS-Cxx74-PA: Update to 3x.8.0.3-r13 MS-C8477-HPG1: Update to 63.8.0.4-r4  MS-C8477-PC: Update to 48.8.0.4-r4 MS-C5321-FPE: Update to 62.8.0.4-r6 MS-Cxx72-xxxPE: Update to 61.8.0.5-r2 MS-Cxx62-xxxPE: Update to 61.8.0.5-r2 MS-Cxx52-xxxPE: Update to 61.8.0.5-r2 MS-Cxx66-xxxPE: Update to 61.8.0.5-r2 MS-Cxx66-xxxGPE: Update to 61.8.0.5-r2 MS-Cxx61-xxxPE: Update to 61.8.0.5-r2 MS-Cxx67-xxxPE: Update to 61.8.0.5-r2 MS-Cxx71-xxxPE: Update to 61.8.0.5-r2 MS-Cxx41-xxxPE: Update to 61.8.0.5-r2 MS-Cxx76-PE: Update to 61.8.0.5-r2 MS-Cxx65-PE: Update to 61.8.0.5-r2 MS-Cxx66-xxxG1: Update to 63.8.0.5-r4 MS-Cxx62-xxxG1: Update to 63.8.0.5-r4 MS-Cxx72-xxxG1: Update to 63.8.0.5-r4 MS-CQxx31-xxxG1: Update to CQ_63.8.0.5-r2  MS-CQxx68-xxxG1: Update to CQ_63.8.0.5-r2 MS-CQxx72-xxxG1: Update to CQ_63.8.0.5-r2 MS-Nxxxx-NxE: Update to 7x.9.0.19-r6 MS-Nxxxx-xxC: Update to 7x.9.0.19-r6 MS-Nxxxx-xxE: Update to 7x.9.0.19-r6 MS-Nxxxx-xxG: Update to 7x.9.0.19-r6 MS-Nxxxx-xxH: Update to 7x.9.0.19-r6 MS-Nxxxx-xxT: Update to 7x.9.0.19-r6 PMC8266-FPE: Update to PO_61.8.0.4-r1 PMC8266-FGPE: Update to PO_61.8.0.4-r1 PM3322-E: Update to PI_61.8.0.3-r5 TS4466-X4RIPG1: Update to T_63.8.0.4-r4  TS5366-X12RIPG1: Update to T_63.8.0.4-r4 TS8266-X4RIPG1: Update to T_63.8.0.4-r4 TS4466-X4RIVPG1: Update to T_63.8.0.4-r4 TS4466-RFIVPG1: Update to T_63.8.0.4-r4 TS8266-X4RIVPG1: Update to T_63.8.0.4-r4 TS8266-RFIVPG1: Update to T_63.8.0.4-r4 TS4466-X4RIWG1: Update to T_63.8.0.4-r4 TS8266-X4RIWG1: Update to T_63.8.0.4-r4 TS5510-GVH: Update to T_47.8.0.4-r8 TS5510-GH: Update to T_47.8.0.4-r8 TS5511-GVH: Update to T_47.8.0.4-r8 TS2966-X12TPE: Update to T_61.8.0.4-r4 TS4466-X4RPE: Update to T_61.8.0.4-r4 TS5366-X12PE: Update to T_61.8.0.4-r4 TS8266-X4PE: Update to T_61.8.0.4-r4 TS2966-X12TVPE: Update to T_61.8.0.4-r4 TS4466-X4RVPE: Update to T_61.8.0.4-r4 TS5366-X12VPE: Update to T_61.8.0.4-r4 TS8266-X4VPE: Update to T_61.8.0.4-r4 TS4441-X36RPE: Update to T_61.8.0.4-r4 TS4441-X36RE: Update to T_61.8.0.4-r4 TS4466-X4RWE: Update to T_61.8.0.4-r4 TS8266-X4WE: Update to T_61.8.0.4-r4 MS-C2964-RFLPC: Update to T_45.8.0.3-r10 MS-C2972-RFLPC: Update to T_45.8.0.3-r10 MS-C2966-RFLWPC: Update to T_45.8.0.3-r10 TS2866-X4TPC: Update to T_45.8.0.3-r10 TS2866-X4TVPC: Update to T_45.8.0.3-r10 TS2866-X4TGPC: Update to T_45.8.0.3-r10 TS2841-X36TPC: Update to T_45.8.0.3-r10 TS2841-X36TPC/W: Update to T_45.8.0.3-r10 TS2867-X5TPC: Update to T_45.8.0.3-r10 TS2961-X12TPC: Update to T_45.8.0.3-r10 TS8266-FPC/P: Update to T_45.8.0.3-r10 MS-C2966-X12RLPC: Update to T_45.8.0.3-r10 MS-C2966-X12RLVPC: Update to T_45.8.0.3-r10 MS-C5366-X12LPC: Update to T_45.8.0.3-r10 MS-C5366-X12LVPC: Update to T_45.8.0.3-r10 MS-C5361-X12LPC: Update to T_45.8.0.3-r10 MS-Cxx66-xxxxGOPC: Update to 45.8.0.2-AIoT-r5 SC211: Update to C_21.1.0.8-r5 SP111: Update to 52.8.0.4-r6 MS-Cxx66-RFIPKG1: Update to 63.8.0.5-r2-NX MS-Cxx72-RFIPKG1: Update to 63.8.0.5-r2-NX MS-Cxx66-FIPKG1: Update to 63.8.0.5-r2-NX MS-Cxx72-FIPKG1: Update to 63.8.0.5-r2-NX

Milesight asks all users to report potential security vulnerabilities to security@milesight.com. mailto:security@milesight.com Learn more: Milesight Vulnerability Reporting Policy https://www.milesight.com/legal/vulnerability-report

Configurations

Workarounds

Exploits

Credits

finder
Souvik Kandar reported these vulnerabilities to CISA
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03
N/A
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.json
N/A
https://www.milesight.com/support/download/firmware
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03
Resource: N/A
Hyperlink: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.json
Resource: N/A
Hyperlink: https://www.milesight.com/support/download/firmware
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:28 Apr, 2026 | 00:16
Updated At:28 Apr, 2026 | 00:16

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.7HIGH
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-798Primaryics-cert@hq.dhs.gov
CWE ID: CWE-798
Type: Primary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.jsonics-cert@hq.dhs.gov
N/A
https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03ics-cert@hq.dhs.gov
N/A
https://www.milesight.com/support/download/firmwareics-cert@hq.dhs.gov
N/A
Hyperlink: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.json
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://www.milesight.com/support/download/firmware
Source: ics-cert@hq.dhs.gov
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

55Records found

CVE-2024-41616
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.78% / 73.78%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 00:00
Updated-07 Aug, 2024 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DIR-300 REVA FIRMWARE v1.06B05_WW contains hardcoded credentials in the Telnet service.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-300_firmwaredir-300n/adir-300_firmware
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-42850
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-8.8||HIGH
EPSS-0.04% / 12.60%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak default administrator password for the web interface and serial port was reported in some Lenovo Personal Cloud Storage devices that could allow unauthorized device access to an attacker with physical or local network access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-t2prot1_firmwaret2pro_firmwarex1t1x1_firmwaret2t2_firmwarea1_firmwarea1Personal Cloud Storage X1Personal Cloud Storage T1Personal Cloud Storage A1Personal Cloud Storage T2Personal Cloud Storage T2Pro
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-49551
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-8.8||HIGH
EPSS-0.20% / 41.99%
||
7 Day CHG+0.14%
Published-08 Jul, 2025 | 20:49
Updated-26 Feb, 2026 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ColdFusion | Use of Hard-coded Credentials (CWE-798)

ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Use of Hard-coded Credentials vulnerability that could result in privilege escalation. An attacker could leverage this vulnerability to gain unauthorized access to sensitive systems or data. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses.

Action-Not Available
Vendor-Adobe Inc.
Product-coldfusionColdFusion
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-32889
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.09% / 24.46%
||
7 Day CHG~0.00%
Published-01 May, 2025 | 00:00
Updated-20 Jun, 2025 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The verification token used for sending SMS through a goTenna server is hardcoded in the app.

Action-Not Available
Vendor-gotennan/a
Product-meshmesh_firmwaregotennan/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-32888
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.09% / 24.46%
||
7 Day CHG~0.00%
Published-01 May, 2025 | 00:00
Updated-20 Jun, 2025 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The verification token used for sending SMS through a goTenna server is hardcoded in the app.

Action-Not Available
Vendor-gotennan/a
Product-meshmesh_firmwaregotennan/a
CWE ID-CWE-798
Use of Hard-coded Credentials
  • Previous
  • 1
  • 2
  • Next
Details not found