CVE-2025-12552
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-10
Assigner: azure-access
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| azure-access | blu-ic2_firmware | to 1.20 (exc) |
| azure-access | blu-ic2 | * |
| azure-access | blu-ic4_firmware | to 1.20 (exc) |
| azure-access | blu-ic4 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-521 | The product does not require that users should have strong passwords. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Insufficient Password Policy issue affecting BLU-IC2 and BLU-IC4 products up to version 1.19.5. It means that the password policies implemented in these products are not strong enough to adequately protect user accounts, potentially allowing attackers to exploit weak password requirements.
How can this vulnerability impact me? :
The insufficient password policy can lead to increased risk of unauthorized access to systems or accounts, as weak passwords may be easier to guess or crack. This can result in data breaches, loss of sensitive information, and potential compromise of system integrity.