CVE-2025-3321
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-06

Last updated on: 2025-06-06

Assigner: B. Braun SE

Description
A predefined administrative account is not documented and cannot be deactivated. This account cannot be misused from the network, only by local users on the server.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-06
Last Modified
2025-06-06
Generated
2026-05-07
AI Q&A
2025-06-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves a predefined administrative account on a server that is not documented and cannot be deactivated. Although this account cannot be accessed or misused remotely over the network, it can be exploited by local users who have physical or local access to the server.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing local users on the server to misuse an undocumented administrative account that cannot be disabled. This could lead to unauthorized local access with high privileges, potentially compromising the server's security and integrity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a predefined administrative account that cannot be deactivated and is only exploitable by local users on the server, not over the network. Therefore, network detection methods are not applicable. Since no specific detection commands or technical details are provided in the resources, no exact commands can be suggested to detect this account.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability cannot be exploited remotely and only affects local users due to an undeactivatable predefined administrative account. No specific mitigation steps or workarounds are provided in the available resources. General best practice would be to restrict local access to trusted personnel only and monitor local user activities, but no official guidance is available from the provided information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart