By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections.
References
| Link | Resource |
|---|---|
| https://support.abilis.net/relnotes/cpx2k/R9.0.html#R9.0.7 | Release Notes |
| https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111111111011111111110000000000000000000000000000000000000000000000000000000100 | Exploit Mitigation Third Party Advisory |
| https://www.runzero.com/advisories/abilis-cpx-authentication-bypass-cve-2025-35021/ | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-04 01:15
Updated : 2026-01-13 15:00
NVD link : CVE-2025-35021
Mitre link : CVE-2025-35021
CVE.ORG link : CVE-2025-35021
JSON object : View
Products Affected
antek
- abilis_cpx_2000
- abilis_cpx_firmware
CWE
CWE-1188
Initialization of a Resource with an Insecure Default
