Cyber Posture

CVE-2025-53968

High

Published: 22 January 2026

Published
22 January 2026
Modified
02 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0010 27.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53968 is a high-severity Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability in Evmapa Evmapa. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Brute Force (T1110); ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Brute Force (T1110) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-307

This control directly enforces limits on consecutive invalid logon attempts and automatic response (e.g., lockout) to prevent brute-force exploitation of authentication mechanisms.

addresses: CWE-307

Specific conditions can include excessive failed attempts, triggering stronger authentication that restricts brute-force exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1110 Brute Force Credential Access
Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Lack of rate limiting directly enables unlimited authentication attempts for brute force (T1110) and application-layer DoS via exploitation (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

This vulnerability arises because there are no limitations on the number of authentication attempts a user can make. An attacker can exploit this weakness by continuously sending authentication requests, leading to a denial-of-service (DoS) condition. This can overwhelm the authentication…

more

system, rendering it unavailable to legitimate users and potentially causing service disruption. This can also allow attackers to conduct brute-force attacks to gain unauthorized access.

Deeper analysisAI

CVE-2025-53968, published on 2026-01-22, is a high-severity vulnerability (CVSS 7.5; AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) classified under CWE-307: Improper Restriction of Excessive Authentication Attempts. It affects authentication systems that impose no limitations on the number of authentication attempts a user can make, as detailed in CISA's ICS advisory ICSA-26-022-08.

Remote unauthenticated attackers can exploit this vulnerability by continuously sending authentication requests, triggering a denial-of-service (DoS) condition that overwhelms the authentication system and renders it unavailable to legitimate users, potentially causing broader service disruptions. The lack of rate limiting also enables brute-force attacks aimed at gaining unauthorized access.

For mitigation guidance, refer to the official advisories: CISA ICSA-26-022-08 at https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08 and the corresponding CSAF JSON document at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json.

Details

CWE(s)

Affected Products

evmapa
evmapa
all versions

CVEs Like This One

CVE-2025-54816Same product: Evmapa Evmapa
CVE-2025-55705Same product: Evmapa Evmapa
CVE-2024-55008Shared CWE-307
CVE-2025-69246Shared CWE-307
CVE-2026-6947Shared CWE-307
CVE-2025-23368Shared CWE-307
CVE-2026-22278Shared CWE-307
CVE-2026-35597Shared CWE-307
CVE-2025-14362Shared CWE-307
CVE-2025-69615Shared CWE-307

References