CVSS VectorNVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3DescriptionNVD
An authentication bypass vulnerability exists in KCM3100 Ver1.4.2 and earlier. If this vulnerability is exploited, an attacker may bypass the authentication of the product from within the LAN to which the product is connected.
AnalysisAI
CVE-2025-51381 is an authentication bypass vulnerability in KCM3100 version 1.4.2 and earlier that allows unauthenticated attackers on the local network (LAN) to completely bypass product authentication and gain full system access. The vulnerability has a critical CVSS score of 9.8 with no authentication or user interaction required, enabling attackers to achieve complete confidentiality, integrity, and availability compromise of affected devices.
Technical ContextAI
The vulnerability is classified as CWE-288 (Authentication Using a Single Factor), indicating the product relies on insufficient or bypassable authentication mechanisms. KCM3100 is a network-connected device (likely industrial control or network management equipment based on naming convention) that implements authentication controls that can be circumvented by attackers within the LAN segment. The vulnerability likely stems from weak or missing authentication validation in network protocol handlers, insufficient session management, or hard-coded credentials that can be leveraged without valid user credentials. The LAN-only attack vector suggests the vulnerability may exist in local network discovery, device management protocols (such as UPnP, SNMP, or proprietary management protocols), or management interfaces accessible on the internal network.
RemediationAI
Upgrade KCM3100 to version 1.4.3 or later when available from the vendor; priority: IMMEDIATE Network Segmentation: Isolate KCM3100 devices on a restricted VLAN or network segment; implement network access controls (firewall rules) to limit access to the device management interfaces to trusted administrative hosts only; priority: IMMEDIATE (interim mitigation) Access Control: Disable remote management interfaces or restrict them to specific IP addresses if the device supports such configuration; priority: HIGH (interim mitigation) Monitoring: Enable logging on the device and monitor for unauthorized authentication attempts or anomalous management traffic; priority: HIGH Vendor Advisory: Contact the KCM3100 vendor directly for official security advisory, patch availability timeline, and specific remediation guidance. Vendor advisory URL not available in provided CVE data.; priority: IMMEDIATE
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18627