CVE-2026-25601

A vulnerability was identified in MEPIS RM, an industrial software product developed by Metronik. The application contained a hardcoded cryptographic key within the Mx.Web.ComponentModel.dll component. When the option to store domain passwords was enabled, this key was used to encrypt user passwords before storing them in the application’s database. An attacker with sufficient privileges to access the database could extract the encrypted passwords, decrypt them using the embedded key, and gain unauthorized access to the associated ICS/OT environment.
References
Link Resource
https://www.cert.si/en/cve-2026-25601/ Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:metronik:mepis_rm:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:metronik:mepis_rm:*:*:*:*:*:*:*:*
cpe:2.3:a:metronik:mepis_rm:8.2.0007:-:*:*:*:*:*:*

History

07 Apr 2026, 20:47

Type Values Removed Values Added
CPE cpe:2.3:a:metronik:mepis_rm:*:*:*:*:*:*:*:*
cpe:2.3:a:metronik:mepis_rm:8.2.0007:-:*:*:*:*:*:*
First Time Metronik mepis Rm
Metronik
References () https://www.cert.si/en/cve-2026-25601/ - () https://www.cert.si/en/cve-2026-25601/ - Broken Link

01 Apr 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 12:16

Updated : 2026-04-07 20:47


NVD link : CVE-2026-25601

Mitre link : CVE-2026-25601

CVE.ORG link : CVE-2026-25601


JSON object : View

Products Affected

metronik

  • mepis_rm
CWE
CWE-798

Use of Hard-coded Credentials