CVE-2025-12285
Published: 26 October 2025
Summary
CVE-2025-12285 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Azure-Access Blu-Ic2 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 26.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and AC-2 (Account Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 requires changing default authenticators prior to first use and managing password strength, directly mitigating the missing initial password change vulnerability.
AC-2 enforces account management processes including initial provisioning, modification, and disabling of default accounts to prevent exploitation of unchanged credentials.
SI-2 mandates timely flaw remediation, such as applying vendor patches to add initial password change enforcement for affected BLU-IC2 and BLU-IC4 devices.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability involves unchanged default or weak initial passwords allowing unauthenticated remote access to high-level privileges, directly facilitating use of default accounts (T1078.001).
NVD Description
Missing Initial Password Change.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Deeper analysisAI
CVE-2025-12285 is a critical vulnerability involving missing initial password change, published on 2025-10-26. It affects BLU-IC2 through version 1.19.5 and BLU-IC4 through version 1.19.5. The issue is linked to CWE-20 (Improper Input Validation) and CWE-521 (Weak Password Requirements), earning a CVSS v3.1 base score of 9.8 due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.
Remote attackers require no authentication or privileges to exploit this vulnerability over the network. Successful exploitation allows attackers to gain high-level access, potentially compromising the full confidentiality, integrity, and availability of affected BLU-IC2 or BLU-IC4 devices by leveraging unchanged default or weak initial passwords.
For mitigation details, refer to the security advisory at https://azure-access.com/security-advisories.
Details
- CWE(s)