CVE-2025-53968
Published: 22 January 2026
Summary
CVE-2025-53968 is a high-severity Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability in Evmapa Evmapa. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Brute Force (T1110); ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
This control directly enforces limits on consecutive invalid logon attempts and automatic response (e.g., lockout) to prevent brute-force exploitation of authentication mechanisms.
Specific conditions can include excessive failed attempts, triggering stronger authentication that restricts brute-force exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Lack of rate limiting directly enables unlimited authentication attempts for brute force (T1110) and application-layer DoS via exploitation (T1499.004).
NVD Description
This vulnerability arises because there are no limitations on the number of authentication attempts a user can make. An attacker can exploit this weakness by continuously sending authentication requests, leading to a denial-of-service (DoS) condition. This can overwhelm the authentication…
more
system, rendering it unavailable to legitimate users and potentially causing service disruption. This can also allow attackers to conduct brute-force attacks to gain unauthorized access.
Deeper analysisAI
CVE-2025-53968, published on 2026-01-22, is a high-severity vulnerability (CVSS 7.5; AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) classified under CWE-307: Improper Restriction of Excessive Authentication Attempts. It affects authentication systems that impose no limitations on the number of authentication attempts a user can make, as detailed in CISA's ICS advisory ICSA-26-022-08.
Remote unauthenticated attackers can exploit this vulnerability by continuously sending authentication requests, triggering a denial-of-service (DoS) condition that overwhelms the authentication system and renders it unavailable to legitimate users, potentially causing broader service disruptions. The lack of rate limiting also enables brute-force attacks aimed at gaining unauthorized access.
For mitigation guidance, refer to the official advisories: CISA ICSA-26-022-08 at https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08 and the corresponding CSAF JSON document at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json.
Details
- CWE(s)