CVE-2025-52689
BaseFortify
Publication date: 2025-07-16
Last updated on: 2025-07-16
Assigner: CSA
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| alcatel-lucent | enterprise_ap1361d_wifi_access_point | * |
| alcatel-lucent | enterprise_ap1361d_wifi_access_point | 4.0.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-384 | Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability is severe as it allows an attacker to gain administrator privileges without authentication. This can lead to unauthorized modifications of the access point's behavior, potentially disrupting network operations, compromising security, and allowing further attacks.
Can you explain this vulnerability to me?
This vulnerability allows an unauthenticated attacker to obtain a valid administrator session ID by spoofing the login request. This means the attacker can gain administrator-level access without proper authentication and potentially change how the access point behaves.