CVE-2026-25715
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2026-02-20

Last updated on: 2026-02-20

Assigner: ICS-CERT

Description
The web management interface of the device allows the administrator username and password to be set to blank values. Once applied, the device permits authentication with empty credentials over the web management interface and Telnet service. This effectively disables authentication across all critical management channels, allowing any network-adjacent attacker to gain full administrative control without credentials.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-02-20
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-521 The product does not require that users should have strong passwords.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because the web management interface of the device allows the administrator username and password to be set to blank values.

Once these blank credentials are applied, the device permits authentication with empty credentials over both the web management interface and the Telnet service.

This effectively disables authentication across all critical management channels, allowing any network-adjacent attacker to gain full administrative control without needing any credentials.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows an attacker who is on the same network or adjacent network to gain full administrative control of the affected device without any authentication.

With full administrative control, the attacker can compromise the device's confidentiality, integrity, and availability.

  • Confidentiality: The attacker can access sensitive information stored or transmitted by the device.
  • Integrity: The attacker can modify configurations or data, potentially causing malicious behavior.
  • Availability: The attacker can disrupt device operations, causing denial of service.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that the administrator username and password are not set to blank values on the device's web management interface.

Set strong, non-empty credentials to prevent unauthorized access over both the web management interface and Telnet service.

Restrict network access to the management interfaces to trusted hosts only, if possible.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart