Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
References
Link | Resource |
---|---|
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json | Third Party Advisory |
https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution | Release Notes Vendor Advisory |
https://www.cve.org/CVERecord?id=CVE-2025-35114 | Third Party Advisory |
Configurations
History
02 Sep 2025, 17:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Atlassian agiloft
Atlassian |
|
CPE | cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:* | |
References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json - Third Party Advisory | |
References | () https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution - Release Notes, Vendor Advisory | |
References | () https://www.cve.org/CVERecord?id=CVE-2025-35114 - Third Party Advisory |
29 Aug 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Aug 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-26 23:15
Updated : 2025-09-02 17:58
NVD link : CVE-2025-35114
Mitre link : CVE-2025-35114
CVE.ORG link : CVE-2025-35114
JSON object : View
Products Affected
atlassian
- agiloft
CWE
CWE-1392
Use of Default Credentials