A vulnerability was identified in MEPIS RM, an industrial
software product developed by Metronik. The application contained a hardcoded
cryptographic key within the Mx.Web.ComponentModel.dll component. When the
option to store domain passwords was enabled, this key was used to encrypt user
passwords before storing them in the application’s database. An attacker with
sufficient privileges to access the database could extract the encrypted
passwords, decrypt them using the embedded key, and gain unauthorized access to
the associated ICS/OT environment.
References
| Link | Resource |
|---|---|
| https://www.cert.si/en/cve-2026-25601/ | Broken Link |
Configurations
History
07 Apr 2026, 20:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:metronik:mepis_rm:*:*:*:*:*:*:*:* cpe:2.3:a:metronik:mepis_rm:8.2.0007:-:*:*:*:*:*:* |
|
| First Time |
Metronik mepis Rm
Metronik |
|
| References | () https://www.cert.si/en/cve-2026-25601/ - Broken Link |
01 Apr 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 12:16
Updated : 2026-04-07 20:47
NVD link : CVE-2026-25601
Mitre link : CVE-2026-25601
CVE.ORG link : CVE-2026-25601
JSON object : View
Products Affected
metronik
- mepis_rm
CWE
CWE-798
Use of Hard-coded Credentials
