CVE-2025-6077
BaseFortify
Publication date: 2025-08-02
Last updated on: 2025-11-03
Assigner: CERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1391 | The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists because Partner Software's product and its web application use the same default username and password for the administrator account across all versions. This means that anyone who knows or guesses these default credentials can gain administrative access.
How can this vulnerability impact me? :
If an attacker uses the default administrator username and password, they can gain unauthorized administrative access to the software and web application. This could lead to unauthorized changes, data exposure, or control over the system.
What immediate steps should I take to mitigate this vulnerability?
Change the default administrator username and password to unique, strong credentials immediately to prevent unauthorized access.