CVE-2025-1393
Published: 05 March 2025
Summary
CVE-2025-1393 is a critical-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Certvde (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 29.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates this CVE by requiring timely identification, reporting, and correction of the hard-coded credentials flaw through patching as detailed in the advisory.
Prevents exploitation of hard-coded credentials by mandating proper authenticator management, including changing defaults and protecting against unauthorized use.
Reduces risk by requiring management of all accounts to disable unnecessary privileged ones and ensure unique authenticators, addressing potential hard-coded admin accounts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability description directly describes remote unauthenticated exploitation of a public-facing product via hardcoded credentials to obtain full administrative access, mapping to T1190 for the exploitation method and T1078 for leveraging the resulting valid accounts.
NVD Description
An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product.
Deeper analysisAI
CVE-2025-1393 is a critical vulnerability (CVSS 3.1 score of 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) published on 2025-03-05, stemming from the use of hard-coded credentials (CWE-798) in the affected product. It enables an unauthenticated remote attacker to gain full administration privileges without requiring prior authentication or user interaction.
An unauthenticated attacker with network access to the affected product can exploit this vulnerability by leveraging the hard-coded credentials. Successful exploitation grants complete administrative control, resulting in high impacts to confidentiality, integrity, and availability.
The advisory at https://certvde.com/en/advisories/VDE-2025-021 provides further details on mitigation and patches for this vulnerability.
Details
- CWE(s)