CVE-2025-35021
BaseFortify
Publication date: 2025-11-04
Last updated on: 2025-11-04
Assigner: Austin Hackers Anonymous
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| abilis | cpx | 9.0.6 |
| abilis | cpx | 9.0.7 |
| abilis | cpx | 9.0.5 |
| abilis | cpx | 8.* |
| abilis | cpx | 9.0.4 |
| abilis | cpx | 7.4.10 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1188 | The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can gain unauthorized access to a restricted shell on the device, potentially allowing them to relay connections and misuse the device for malicious purposes, which could lead to unauthorized network access or data interception.
Can you explain this vulnerability to me?
This vulnerability allows an attacker to bypass authentication on an unconfigured Abilis CPX device by failing to authenticate three times via SSH. On the fourth attempt, the attacker can gain access to a restricted shell and use it to relay connections.