CVE-2025-67652
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-01-26

Assigner: ICS-CERT

Description
An attacker with access to the project file could use the exposed credentials to impersonate users, escalate privileges, or gain unauthorized access to systems and services. The absence of robust encryption or secure handling mechanisms increases the likelihood of this type of exploitation, leaving sensitive information more vulnerable.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-01-26
Generated
2026-05-07
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-261 Obscuring a password with a trivial encoding does not protect the password.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves exposed credentials within a project file that an attacker with access to the file can exploit. The attacker could impersonate users, escalate privileges, or gain unauthorized access to systems and services. The lack of strong encryption or secure handling increases the risk of such exploitation, making sensitive information vulnerable.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to systems and services, user impersonation, and privilege escalation. This could compromise sensitive information and system integrity, potentially causing operational disruptions or data breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart