CVE-2025-3321

| EUVD-2025-17093 CRITICAL
2025-06-06 [email protected]
9.4
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17093
CVE Published
Jun 06, 2025 - 08:15 nvd
CRITICAL 9.4

Description

A predefined administrative account is not documented and cannot be deactivated. This account cannot be misused from the network, only by local users on the server.

Analysis

Hardcoded administrative account vulnerability in an undocumented system component that cannot be deactivated, allowing local users to gain complete system compromise with high confidentiality, integrity, and availability impact. While the vulnerability carries a critical CVSS 9.4 score, the attack vector is restricted to local access only, significantly reducing real-world network-based exploitation risk. The vulnerability's severity stems from CWE-798 (Use of Hard-Coded Credentials), a foundational authentication bypass mechanism that enables privilege escalation and persistent administrative access.

Technical Context

This vulnerability exploits a hardcoded credential stored within application or system code, representing a failure in secure credential management practices (CWE-798). The predefined administrative account is baked into the software during compilation/deployment and lacks documented removal procedures or deactivation mechanisms. The CVSS 4.0 vector indicates local attack vector (AV:L), requiring physical or logical access to the target system. The high impact ratings (VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) demonstrate that successful exploitation grants complete system compromise including confidentiality breach, integrity modification, and availability disruption across both the vulnerable component and connected systems. The undocumented nature of this account suggests it may be intended for development/debugging purposes that was inadvertently shipped to production.

Affected Products

Specific product name, vendor, and version information is not provided in the CVE description. CPE string data was not included in the vulnerability report. Affected systems are described generically as 'servers' running software with predefined administrative accounts. To identify affected products, cross-reference this CVE against: (1) vendor security advisories mentioning CVE-2025-3321, (2) product documentation disclosing hardcoded accounts, (3) NIST NVD CPE mappings, and (4) affected software vendors' official vulnerability databases. Common affected categories likely include: proprietary enterprise management software, embedded system firmware, legacy server applications, and development/testing platforms where such accounts may have been left in production builds.

Remediation

Immediate remediation steps: (1) Identify and document the predefined administrative account name and default credentials through code review or vendor documentation; (2) Apply vendor-released security patch when available (version numbers not specified in provided data—consult vendor advisory); (3) If patching is delayed, implement compensating controls: enforce strict local access controls via OS-level authentication (PAM, SSSD), disable unnecessary local accounts, implement account lockout policies, and monitor for use of the undocumented account via audit logging; (4) Change or disable the hardcoded account if the system provides administrative interface access; (5) Restrict physical access and SSH/console access to authorized personnel only; (6) Implement host-based intrusion detection to alert on unauthorized administrative access patterns. Long-term: request vendor patch with account removal or secure credential rotation mechanisms, and conduct code review to identify similar hardcoded credentials.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +47
POC: 0

Share

CVE-2025-3321 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy