CVE-2025-4320
Unknown
Unknown - Not Provided
Authentication Bypass via Weak Password Recovery in Sufirmam
Publication date: 2026-01-23
Last updated on: 2026-01-23
Assigner: Computer Emergency Response Team of the Republic of Turkey
Description
Description
Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026.Β NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| birebirsoft | sufirmam | to 23012026 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-640 | The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. |
| CWE-305 | The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Birebirsoft Software and Technology Solutions Sufirmam involves an authentication bypass due to a weak password recovery mechanism. It allows attackers to bypass authentication and exploit the password recovery process to gain unauthorized access.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to the affected system, potentially resulting in full compromise of confidentiality, integrity, and availability of the system and its data.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70