Cyber Posture

CVE-2025-55269

Medium

Published: 26 March 2026

Published
26 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
EPSS Score 0.0002 5.8th percentile
Risk Priority 8 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55269 is a medium-severity Weak Password Requirements (CWE-521) vulnerability in Hcltech Aftermarket Cloud. Its CVSS base score is 4.2 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Brute Force (T1110); ranked at the 5.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-7 (Unsuccessful Logon Attempts) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Brute Force (T1110) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires authenticator management with sufficient strength of mechanism to enforce strong password policies, preventing weak passwords vulnerable to guessing.

prevent

Enforces limits on unsuccessful logon attempts and account lockouts, directly mitigating brute-force attacks enabled by the weak password policy.

detect

Generates audit records for authentication events, enabling detection of brute-force attempts through patterns of failed logons.

MITRE ATT&CK Enterprise TechniquesAI

T1110 Brute Force Credential Access
Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.
T1110.001 Password Guessing Credential Access
Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts.
Why these techniques?

Weak password policy (CWE-521) directly enables password guessing and brute-force attacks against accounts.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

HCL Aftermarket DPC is affected by Weak Password Policy vulnerability, which makes it easier for attackers to guess weak passwords or use brute-force techniques to gain unauthorized access to user accounts.

Deeper analysisAI

CVE-2025-55269 is a Weak Password Policy vulnerability (CWE-521) affecting HCL Aftermarket DPC software. Published on 2026-03-26 with a CVSS v3.1 base score of 4.2 (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L), it enables attackers to more easily guess weak passwords or perform brute-force attacks, leading to unauthorized access to user accounts.

The vulnerability can be exploited over the network by unauthenticated attackers (PR:N) requiring high attack complexity (AC:H) and user interaction (UI:R), such as tricking a user into actions that facilitate password guessing or brute-force attempts. Successful exploitation results in low-impact outcomes, including limited disclosure of confidential information (C:L) and low disruption to availability (A:L), with no integrity impact (I:N) and unchanged scope (S:U).

HCL Software has published mitigation guidance in its support knowledge base article at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793, which security practitioners should consult for specific remediation steps, such as enforcing stronger password policies.

Details

CWE(s)

Affected Products

hcltech
aftermarket cloud
1.0.0

CVEs Like This One

CVE-2025-55267Same product: Hcltech Aftermarket Cloud
CVE-2025-55262Same product: Hcltech Aftermarket Cloud
CVE-2025-55275Same product: Hcltech Aftermarket Cloud
CVE-2025-55270Same product: Hcltech Aftermarket Cloud
CVE-2025-55265Same product: Hcltech Aftermarket Cloud
CVE-2025-55271Same product: Hcltech Aftermarket Cloud
CVE-2025-55261Same product: Hcltech Aftermarket Cloud
CVE-2025-55263Same product: Hcltech Aftermarket Cloud
CVE-2025-55252Same vendor: Hcltech
CVE-2026-33771Shared CWE-521

References