CVE-2026-25071
Published: 07 March 2026
Summary
CVE-2026-25071 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Seekswan Zikestor Sks8310-8X Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.
Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.
Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.
Guarantees critical functions are protected by mandatory invocation of the access control mechanism.
Auditing sessions makes it possible to detect access to critical functions without required authentication.
The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.
Certification assesses that critical functions have required authentication controls in place.
Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication on public /switch_config.src endpoint directly enables remote exploitation of a network device (T1190) to retrieve full configuration files, which maps precisely to T1602.002 Network Device Configuration Dump and exposes topology/IP/access-control data.
NVD Description
XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain a missing authentication vulnerability in the /switch_config.src endpoint that allows unauthenticated remote attackers to download device configuration files. Attackers can access this endpoint without credentials to retrieve sensitive configuration information…
more
including VLAN settings and IP addressing details.
Deeper analysisAI
CVE-2026-25071 is a missing authentication vulnerability (CWE-306) in the firmware of the XikeStor SKS8310-8X Network Switch, affecting versions 1.04.B07 and prior. The issue exists in the /switch_config.src endpoint, which permits unauthenticated access to download device configuration files containing sensitive details such as VLAN settings and IP addressing information. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact.
Unauthenticated remote attackers can exploit this vulnerability by directly accessing the exposed endpoint over the network without any credentials or privileges. Successful exploitation allows retrieval of configuration files, potentially exposing network topology, access controls, and other operational details that could facilitate further attacks like lateral movement or reconnaissance.
References provided include an OpenWRT table of hardware page for the XikeStor SKS8310-8X and an AliExpress product listing, but no specific advisories, patches, or mitigation guidance are detailed therein.
Details
- CWE(s)