Vulnerabilities (CVE)

Filtered by CWE-1392
Total 70 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-4007 1 Abb 26 Aspect-ent-12, Aspect-ent-12 Firmware, Aspect-ent-2 and 23 more 2025-12-19 N/A 8.8 HIGH
Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.
CVE-2025-35042 1 Airship.ai 1 Acropolis 2025-12-19 N/A 9.8 CRITICAL
Airship AI Acropolis includes a default administrative account that uses the same credentials on every installation. Instances of Airship AI that do not change this account password are vulnerable to a remote attacker logging in and gaining the privileges of this account. Fixed in 10.2.35, 11.0.21, and 11.1.9.
CVE-2025-54303 1 Thermofisher 1 Torrent Suite Software 2025-12-16 N/A 9.8 CRITICAL
The Thermo Fisher Torrent Suite Django application 5.18.1 has weak default credentials, which are stored as fixtures for the Django ORM API. The ionadmin user account can be used to authenticate to default deployments with the password ionadmin. The user guide recommends changing default credentials; however, a password change policy for default administrative accounts is not enforced. Many deployments may retain default credentials, in which case an attacker is likely to be able to successfully authenticate with administrative privileges.
CVE-2023-49621 1 Siemens 2 Simatic Cn 4100, Simatic Cn 4100 Firmware 2025-12-16 N/A 9.8 CRITICAL
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device.
CVE-2021-47707 2025-12-12 N/A N/A
COMMAX CVD-Axx DVR 5.1.4 contains weak default administrative credentials that allow remote password attacks and disclose RTSP stream. Attackers can exploit this by sending a POST request with the 'passkey' parameter set to '1234', allowing them to access the web control panel.
CVE-2024-29844 1 Cs-technologies 1 Evolution 2025-12-10 N/A 9.8 CRITICAL
Default credentials on the Web Interface of Evolution Controller 2.x allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password.
CVE-2025-12592 2025-11-19 N/A N/A
Legacy Vivotek Device firmware uses default credetials for the root and user login accounts.
CVE-2025-11943 1 70mai 2 X200, X200 Firmware 2025-11-17 7.5 HIGH 7.3 HIGH
A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-6529 1 70mai 2 M300, M300 Firmware 2025-11-14 8.3 HIGH 8.8 HIGH
A vulnerability was found in 70mai M300 up to 20250611 and classified as critical. Affected by this issue is some unknown functionality of the component Telnet Service. The manipulation leads to use of default credentials. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-12217 1 Azure-access 4 Blu-ic2, Blu-ic2 Firmware, Blu-ic4 and 1 more 2025-11-10 N/A 9.1 CRITICAL
SNMP Default Community String (public).This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
CVE-2025-12218 1 Azure-access 4 Blu-ic2, Blu-ic2 Firmware, Blu-ic4 and 1 more 2025-11-10 N/A 9.1 CRITICAL
Weak Default Credentials.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
CVE-2025-34516 1 Ilevia 2 Eve X1 Server, Eve X1 Server Firmware 2025-11-03 N/A 9.8 CRITICAL
Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain a use of default credentials vulnerability that allows an unauthenticated attacker to obtain remote access. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.
CVE-2025-10542 2025-11-03 N/A 9.8 CRITICAL
iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain full control over monitored agents and data. This enables reading highly sensitive telemetry (including keylogger output) and issuing arbitrary actions to all connected clients.
CVE-2025-10678 2025-10-21 N/A N/A
NetBird VPN when installed using vendor's provided script failed to remove or change default password of an admin account created by ZITADEL. This issue affects instances installed using vendor's provided script. This issue may affect instances created with Docker if the default password was not changed nor the user was removed. This issue has been fixed in version 0.57.0
CVE-2025-23012 1 Fedorarepository 1 Fcrepo 2025-10-07 N/A 7.5 HIGH
Fedora Repository 3.8.x includes a service account (fedoraIntCallUser) with default credentials and privileges to read read local files by manipulating datastreams. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to a currently supported version (6.5.1 as of 2025-01-23).
CVE-2024-12856 1 Four-faith 4 F3x24, F3x24 Firmware, F3x36 and 1 more 2025-09-25 N/A 7.2 HIGH
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
CVE-2025-51536 1 Craws 1 Openatlas 2025-09-23 N/A 9.8 CRITICAL
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.
CVE-2025-51535 1 Craws 1 Openatlas 2025-09-20 N/A 9.1 CRITICAL
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a SQL injection vulnerability.
CVE-2025-55110 2025-09-17 N/A 5.5 MEDIUM
Control-M/Agents use a kdb or PKCS#12 keystore by default, and the default keystore password is well known and documented. An attacker with read access to the keystore could access sensitive data using this password.
CVE-2025-8530 1 Eladmin 1 Eladmin 2025-09-12 5.0 MEDIUM 5.3 MEDIUM
A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is some unknown functionality of the file eladmin-system\src\main\resources\config\application-prod.yml of the component Druid. The manipulation of the argument login-username/login-password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.