CVE-2025-55252
Published: 19 January 2026
Summary
CVE-2025-55252 is a low-severity Weak Password Requirements (CWE-521) vulnerability in Hcltech Aion. Its CVSS base score is 3.1 (Low).
Operationally, exploitation aligns with the MITRE ATT&CK technique Password Guessing (T1110.001); ranked at the 13.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Configuration settings can define and enforce strong password requirements to avoid weak policies.
IA policy establishes password requirements, directly addressing weak password requirements.
Ensuring authenticators have sufficient strength of mechanism for intended use addresses weak password requirements.
Organization-wide password and authentication policies are applied uniformly, preventing weak local password requirements.
Facilitated training and awareness of current practices improves definition and enforcement of sufficiently strong password requirements.
Dedicated security resources support deployment of strong authentication systems and enforcement of robust password policies.
Vulnerability scans assess password policies and weak credential requirements against benchmarks.
User documentation on maintaining security includes password requirements, directly mitigating weak password policies.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Weak password policy (CWE-521) directly enables password guessing attacks against accounts.
NVD Description
HCL AION version 2 is affected by a Weak Password Policy vulnerability. This can allow the use of easily guessable passwords, potentially resulting in unauthorized access
Deeper analysisAI
CVE-2025-55252 is a Weak Password Policy vulnerability (CWE-521) affecting HCL AION version 2. The issue enables the use of easily guessable passwords, which can lead to unauthorized access. It received a CVSS v3.1 base score of 3.1 (AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N) and was published on 2026-01-19.
Exploitation requires high privileges (PR:H), user interaction (UI:R), and high attack complexity (AC:H) over the network (AV:N). A successful attack could result in low-impact unauthorized access, with limited effects on confidentiality and integrity but no availability disruption.
HCL Software has published a knowledge base article detailing the vulnerability at https://support.hcl-software.com/kb_view.do?sys_kb_id=4b92474633de7ad4159a05273e5c7b4b&searchTerm=kb0127995#, which security practitioners should consult for mitigation guidance and patches.
Details
- CWE(s)