CVE-2025-51381

| EUVD-2025-18627 CRITICAL
2025-06-18 [email protected]
9.8
CVSS 3.0
Share

CVSS VectorNVD

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 22:49 euvd
EUVD-2025-18627
Analysis Generated
Mar 14, 2026 - 22:49 vuln.today
CVE Published
Jun 18, 2025 - 05:15 nvd
CRITICAL 9.8

DescriptionNVD

An authentication bypass vulnerability exists in KCM3100 Ver1.4.2 and earlier. If this vulnerability is exploited, an attacker may bypass the authentication of the product from within the LAN to which the product is connected.

AnalysisAI

CVE-2025-51381 is an authentication bypass vulnerability in KCM3100 version 1.4.2 and earlier that allows unauthenticated attackers on the local network (LAN) to completely bypass product authentication and gain full system access. The vulnerability has a critical CVSS score of 9.8 with no authentication or user interaction required, enabling attackers to achieve complete confidentiality, integrity, and availability compromise of affected devices.

Technical ContextAI

The vulnerability is classified as CWE-288 (Authentication Using a Single Factor), indicating the product relies on insufficient or bypassable authentication mechanisms. KCM3100 is a network-connected device (likely industrial control or network management equipment based on naming convention) that implements authentication controls that can be circumvented by attackers within the LAN segment. The vulnerability likely stems from weak or missing authentication validation in network protocol handlers, insufficient session management, or hard-coded credentials that can be leveraged without valid user credentials. The LAN-only attack vector suggests the vulnerability may exist in local network discovery, device management protocols (such as UPnP, SNMP, or proprietary management protocols), or management interfaces accessible on the internal network.

RemediationAI

Upgrade KCM3100 to version 1.4.3 or later when available from the vendor; priority: IMMEDIATE Network Segmentation: Isolate KCM3100 devices on a restricted VLAN or network segment; implement network access controls (firewall rules) to limit access to the device management interfaces to trusted administrative hosts only; priority: IMMEDIATE (interim mitigation) Access Control: Disable remote management interfaces or restrict them to specific IP addresses if the device supports such configuration; priority: HIGH (interim mitigation) Monitoring: Enable logging on the device and monitor for unauthorized authentication attempts or anomalous management traffic; priority: HIGH Vendor Advisory: Contact the KCM3100 vendor directly for official security advisory, patch availability timeline, and specific remediation guidance. Vendor advisory URL not available in provided CVE data.; priority: IMMEDIATE

Share

CVE-2025-51381 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy