CVE-2025-43021
BaseFortify
Publication date: 2025-07-22
Last updated on: 2025-10-02
Assigner: HP Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hp | poly_clariti_manager | to 10.12.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1393 | The product uses default passwords for potentially critical functionality. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Poly Clariti Manager versions prior to 10.12.1 and could allow an attacker to use and retrieve the default password, potentially compromising system security. HP has fixed this issue in the latest software update.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow unauthorized access to the Poly Clariti Manager by using the default password, potentially leading to unauthorized control or data exposure within the affected system.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Poly Clariti Manager software to version 10.12.1 or later, as HP has addressed the issue in this latest software update.