Cyber Posture

CVE-2025-55252

Low

Published: 19 January 2026

Published
19 January 2026
Modified
25 April 2026
KEV Added
Patch
CVSS Score 3.1 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N
EPSS Score 0.0004 13.3th percentile
Risk Priority 6 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55252 is a low-severity Weak Password Requirements (CWE-521) vulnerability in Hcltech Aion. Its CVSS base score is 3.1 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Password Guessing (T1110.001); ranked at the 13.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Password Guessing (T1110.001).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-521

Configuration settings can define and enforce strong password requirements to avoid weak policies.

addresses: CWE-521

IA policy establishes password requirements, directly addressing weak password requirements.

addresses: CWE-521

Ensuring authenticators have sufficient strength of mechanism for intended use addresses weak password requirements.

addresses: CWE-521

Organization-wide password and authentication policies are applied uniformly, preventing weak local password requirements.

addresses: CWE-521

Facilitated training and awareness of current practices improves definition and enforcement of sufficiently strong password requirements.

addresses: CWE-521

Dedicated security resources support deployment of strong authentication systems and enforcement of robust password policies.

addresses: CWE-521

Vulnerability scans assess password policies and weak credential requirements against benchmarks.

addresses: CWE-521

User documentation on maintaining security includes password requirements, directly mitigating weak password policies.

MITRE ATT&CK Enterprise TechniquesAI

T1110.001 Password Guessing Credential Access
Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts.
Why these techniques?

Weak password policy (CWE-521) directly enables password guessing attacks against accounts.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

HCL AION  version 2 is affected by a Weak Password Policy vulnerability. This can  allow the use of easily guessable passwords, potentially resulting in unauthorized access

Deeper analysisAI

CVE-2025-55252 is a Weak Password Policy vulnerability (CWE-521) affecting HCL AION version 2. The issue enables the use of easily guessable passwords, which can lead to unauthorized access. It received a CVSS v3.1 base score of 3.1 (AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N) and was published on 2026-01-19.

Exploitation requires high privileges (PR:H), user interaction (UI:R), and high attack complexity (AC:H) over the network (AV:N). A successful attack could result in low-impact unauthorized access, with limited effects on confidentiality and integrity but no availability disruption.

HCL Software has published a knowledge base article detailing the vulnerability at https://support.hcl-software.com/kb_view.do?sys_kb_id=4b92474633de7ad4159a05273e5c7b4b&searchTerm=kb0127995#, which security practitioners should consult for mitigation guidance and patches.

Details

CWE(s)

Affected Products

hcltech
aion
2.0.0

CVEs Like This One

CVE-2025-52636Same product: Hcltech Aion
CVE-2025-52626Same product: Hcltech Aion
CVE-2025-52643Same product: Hcltech Aion
CVE-2025-52644Same product: Hcltech Aion
CVE-2025-52628Same product: Hcltech Aion
CVE-2025-52631Same product: Hcltech Aion
CVE-2025-52660Same product: Hcltech Aion
CVE-2025-52659Same product: Hcltech Aion
CVE-2025-52627Same product: Hcltech Aion
CVE-2025-55251Same product: Hcltech Aion

References