Cyber Posture

CVE-2026-25071

High

Published: 07 March 2026

Published
07 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0008 24.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25071 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Seekswan Zikestor Sks8310-8X Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

addresses: CWE-306

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1602.002 Network Device Configuration Dump Collection
Adversaries may access network configuration files to collect sensitive data about the device and the network.
Why these techniques?

Missing authentication on public /switch_config.src endpoint directly enables remote exploitation of a network device (T1190) to retrieve full configuration files, which maps precisely to T1602.002 Network Device Configuration Dump and exposes topology/IP/access-control data.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain a missing authentication vulnerability in the /switch_config.src endpoint that allows unauthenticated remote attackers to download device configuration files. Attackers can access this endpoint without credentials to retrieve sensitive configuration information…

more

including VLAN settings and IP addressing details.

Deeper analysisAI

CVE-2026-25071 is a missing authentication vulnerability (CWE-306) in the firmware of the XikeStor SKS8310-8X Network Switch, affecting versions 1.04.B07 and prior. The issue exists in the /switch_config.src endpoint, which permits unauthenticated access to download device configuration files containing sensitive details such as VLAN settings and IP addressing information. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact.

Unauthenticated remote attackers can exploit this vulnerability by directly accessing the exposed endpoint over the network without any credentials or privileges. Successful exploitation allows retrieval of configuration files, potentially exposing network topology, access controls, and other operational details that could facilitate further attacks like lateral movement or reconnaissance.

References provided include an OpenWRT table of hardware page for the XikeStor SKS8310-8X and an AliExpress product listing, but no specific advisories, patches, or mitigation guidance are detailed therein.

Details

CWE(s)

Affected Products

seekswan
zikestor sks8310-8x firmware
≤ 1.04.b07

CVEs Like This One

CVE-2026-25072Same product: Seekswan Zikestor Sks8310-8X
CVE-2026-25070Same product: Seekswan Zikestor Sks8310-8X
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306
CVE-2025-0355Shared CWE-306

References