Cyber Posture

CVE-2025-12285

Critical

Published: 26 October 2025

Published
26 October 2025
Modified
10 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 26.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-12285 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Azure-Access Blu-Ic2 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 26.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and AC-2 (Account Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 requires changing default authenticators prior to first use and managing password strength, directly mitigating the missing initial password change vulnerability.

prevent

AC-2 enforces account management processes including initial provisioning, modification, and disabling of default accounts to prevent exploitation of unchanged credentials.

preventrecover

SI-2 mandates timely flaw remediation, such as applying vendor patches to add initial password change enforcement for affected BLU-IC2 and BLU-IC4 devices.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability involves unchanged default or weak initial passwords allowing unauthenticated remote access to high-level privileges, directly facilitating use of default accounts (T1078.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Missing Initial Password Change.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Deeper analysisAI

CVE-2025-12285 is a critical vulnerability involving missing initial password change, published on 2025-10-26. It affects BLU-IC2 through version 1.19.5 and BLU-IC4 through version 1.19.5. The issue is linked to CWE-20 (Improper Input Validation) and CWE-521 (Weak Password Requirements), earning a CVSS v3.1 base score of 9.8 due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.

Remote attackers require no authentication or privileges to exploit this vulnerability over the network. Successful exploitation allows attackers to gain high-level access, potentially compromising the full confidentiality, integrity, and availability of affected BLU-IC2 or BLU-IC4 devices by leveraging unchanged default or weak initial passwords.

For mitigation details, refer to the security advisory at https://azure-access.com/security-advisories.

Details

CWE(s)

Affected Products

azure-access
blu-ic2 firmware
≤ 1.20
azure-access
blu-ic4 firmware
≤ 1.20

CVEs Like This One

CVE-2025-12275Same product: Azure-Access Blu-Ic2
CVE-2025-12422Same product: Azure-Access Blu-Ic2
CVE-2025-12104Same product: Azure-Access Blu-Ic2
CVE-2025-53963Shared CWE-521
CVE-2026-25715Shared CWE-521
CVE-2025-63747Shared CWE-521
CVE-2025-68716Shared CWE-521
CVE-2026-27623Shared CWE-20
CVE-2025-61614Shared CWE-20
CVE-2026-20856Shared CWE-20

References