CVE-2019-25241

FaceSentry Access Control System 6.4.8 contains a critical authentication vulnerability with hard-coded SSH credentials for the wwwuser account. Attackers can leverage the insecure sudoers configuration to escalate privileges and gain root access by executing sudo commands without authentication.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.0:*:*:*:*:*:*:*
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.2:*:*:*:*:*:*:*
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:6.4.8:*:*:*:*:*:*:*
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-24 20:15

Updated : 2025-12-31 14:15


NVD link : CVE-2019-25241

Mitre link : CVE-2019-25241

CVE.ORG link : CVE-2019-25241


JSON object : View

Products Affected

iwt

  • facesentry_access_control_system
  • facesentry_access_control_system_firmware
CWE
CWE-798

Use of Hard-coded Credentials