CVE-2025-8679
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-01

Last updated on: 2025-10-02

Assigner: ExtremeNetworks

Description
In ExtremeGuest Essentials before 25.5.0, captive-portal may permit unauthorized access via manual brute-force procedure. Under certain ExtremeGuest Essentials captive-portal SSID configurations, repeated manual login attempts may allow an unauthenticated device to be marked as authenticated and obtain network access. Client360 logs may display the client MAC as the username despite no MAC-authentication being enabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-01
Last Modified
2025-10-02
Generated
2026-05-07
AI Q&A
2025-10-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
extreme_networks extremecloud_iq_essentials *
extreme_networks extremeguest_essentials *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-307 The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ExtremeGuest Essentials before version 25.5.0, where the captive-portal may allow unauthorized access through a manual brute-force procedure. Specifically, under certain captive-portal SSID configurations, repeated manual login attempts can cause an unauthenticated device to be incorrectly marked as authenticated, granting it network access. Additionally, Client360 logs may show the client MAC address as the username even though MAC-authentication is not enabled.


How can this vulnerability impact me? :

This vulnerability can allow unauthorized devices to gain network access without proper authentication, potentially exposing the network to unauthorized users. This could lead to security breaches, data exposure, or misuse of network resources.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring Client360 logs for unusual entries where the client MAC address appears as the username despite no MAC-authentication being enabled. This indicates possible unauthorized access via brute-force attempts on the captive-portal. Specific commands are not provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps are not detailed in the provided information. However, reviewing and adjusting captive-portal SSID configurations to prevent repeated manual login attempts and monitoring Client360 logs for suspicious activity may help reduce risk until a patch or update is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart