Overview
The Common Vulnerabilities and Exposures (CVE) system has identified a serious vulnerability in UNI-NMS-Lite, a network management system widely used in various industries. This vulnerability, identified as CVE-2025-46274, could potentially allow an unauthenticated attacker to gain access to, read, manipulate, and create entries in the managed database. With a CVSS Severity Score of 9.8, it is considered a critical risk that could lead to system compromise or data leakage. This vulnerability is significant due to the potential for unauthorized access to sensitive data, which could have severe implications for organizations.
Vulnerability Summary
CVE ID: CVE-2025-46274
Severity: Critical (9.8)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise or data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
UNI-NMS-Lite | All versions prior to patch
How the Exploit Works
The exploit takes advantage of the hard-coded credentials in UNI-NMS-Lite. An attacker can use these credentials to gain unauthorized access to the managed database. Without the need for user interaction or any special privileges, the attacker can read, manipulate, and create entries in the database. This could lead to a range of malicious activities including data theft, data manipulation, or potentially even system compromise.
Conceptual Example Code
Here is a conceptual example of how the vulnerability might be exploited, in this case via a simple HTTP GET request to the target system:
GET /database/endpoint HTTP/1.1
Host: target.example.com
Authorization: Basic [hard-coded credentials]
In this example, the “hard-coded credentials” would be replaced with the actual credentials hardcoded into the system. Such a request could allow the attacker to read, update, or create entries in the managed database.