Airship AI Acropolis allows unlimited MFA attempts for 15 minutes after a user has logged in with valid credentials. A remote attacker with valid credentials could brute-force the 6-digit MFA code. Fixed in 10.2.35, 11.0.21, and 11.1.9.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-265-01.json | Third Party Advisory |
| https://www.cve.org/CVERecord?id=CVE-2025-35041 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Dec 2025, 12:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Airship.ai
Airship.ai acropolis |
|
| CPE | cpe:2.3:a:airship.ai:acropolis:*:*:*:*:*:*:*:* | |
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-265-01.json - Third Party Advisory | |
| References | () https://www.cve.org/CVERecord?id=CVE-2025-35041 - Third Party Advisory |
22 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-22 16:15
Updated : 2025-12-19 12:30
NVD link : CVE-2025-35041
Mitre link : CVE-2025-35041
CVE.ORG link : CVE-2025-35041
JSON object : View
Products Affected
airship.ai
- acropolis
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
