H3C devices running firmware version NX15V100R015 are vulnerable to unauthorized access due to insecure default credentials. The root user account has no password set, and the H3C user account uses the default password "admin," both stored in the /etc/shadow file. Attackers with network access can exploit these credentials to gain unauthorized root-level access to the device via the administrative interface or other network services, potentially leading to privilege escalation, information disclosure, or arbitrary code execution.
Metrics
Affected Vendors & Products
References
History
Fri, 19 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1188 CWE-521 |
|
Metrics |
cvssV3_1
|
Fri, 19 Sep 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
H3c
H3c nx15v100r015 |
|
Vendors & Products |
H3c
H3c nx15v100r015 |
Thu, 18 Sep 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | H3C devices running firmware version NX15V100R015 are vulnerable to unauthorized access due to insecure default credentials. The root user account has no password set, and the H3C user account uses the default password "admin," both stored in the /etc/shadow file. Attackers with network access can exploit these credentials to gain unauthorized root-level access to the device via the administrative interface or other network services, potentially leading to privilege escalation, information disclosure, or arbitrary code execution. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-09-18T00:00:00.000Z
Updated: 2025-09-19T14:19:38.710Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57295

Updated: 2025-09-19T14:18:30.767Z

Status : Awaiting Analysis
Published: 2025-09-18T21:15:49.350
Modified: 2025-09-19T16:00:27.847
Link: CVE-2025-57295

No data.