CVE-2026-3873
Published: 13 March 2026
Summary
CVE-2026-3873 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Avantra (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 1.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Enables users to notice when hard-coded credentials have been exploited for unauthorized access.
Security training explicitly warns against hard-coded credentials, lowering their use in systems.
Policy and procedures prohibit hard-coded credentials in favor of managed authentication.
External identity providers eliminate the need for hard-coded credentials in applications.
Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.
Central credential stores and rotation policies remove the need for hard-coded credentials in configuration files or code.
Intelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.
Planned investment enables secure credential storage and management systems instead of hard-coded credentials.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hard-coded legacy built-in account enables use of default credentials for unauthorized access (T1078.001); network-reachable service with no auth required maps to exploitation of public-facing application (T1190).
NVD Description
Use of Hard-coded Credentials vulnerability in Avantra allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Avantra: before 25.3.0.
Deeper analysisAI
CVE-2026-3873 is a Use of Hard-coded Credentials vulnerability (CWE-798) in Avantra that allows accessing functionality not properly constrained by ACLs. This issue affects Avantra versions before 25.3.0 and has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), indicating high severity due to its network accessibility and lack of prerequisites.
Remote attackers require only network access to exploit this vulnerability, with no privileges, user interaction, or special conditions needed. Exploitation grants unauthorized access to restricted functionality via the hard-coded credentials, enabling limited impacts to confidentiality and integrity under a changed scope.
Avantra's security advisory at https://support.avantra.com/hc/en-us/articles/5352465121695-Security-Notice-Legacy-Built-In-User-Account-rtm addresses this vulnerability, which is fixed in version 25.3.0. Practitioners should update affected systems to mitigate the risk.
Details
- CWE(s)