CVE-2026-25715
BaseFortify
Publication date: 2026-02-20
Last updated on: 2026-02-20
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-521 | The product does not require that users should have strong passwords. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs because the web management interface of the device allows the administrator username and password to be set to blank values.
Once these blank credentials are applied, the device permits authentication with empty credentials over both the web management interface and the Telnet service.
This effectively disables authentication across all critical management channels, allowing any network-adjacent attacker to gain full administrative control without needing any credentials.
How can this vulnerability impact me? :
This vulnerability can have severe impacts as it allows an attacker who is on the same network or adjacent network to gain full administrative control of the affected device without any authentication.
With full administrative control, the attacker can compromise the device's confidentiality, integrity, and availability.
- Confidentiality: The attacker can access sensitive information stored or transmitted by the device.
- Integrity: The attacker can modify configurations or data, potentially causing malicious behavior.
- Availability: The attacker can disrupt device operations, causing denial of service.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the administrator username and password are not set to blank values on the device's web management interface.
Set strong, non-empty credentials to prevent unauthorized access over both the web management interface and Telnet service.
Restrict network access to the management interfaces to trusted hosts only, if possible.