CVE-2025-5124

May 24, 2025, 1:15 p.m.

9.2
Critical

Description

A vulnerability classified as critical has been found in Sony SNC-M1, SNC-M3, SNC-RZ25N, SNC-RZ30N, SNC-DS10, SNC-CS3N and SNC-RX570N up to 1.30. This affects an unknown part of the component Administrative Interface. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. It is recommended to change the configuration settings. The vendor was contacted early about this issue. They confirmed the existence but pointed out that they "have published the 'Hardening Guide' on the Web from July 2018 to January 2025 and have thoroughly informed customers of the recommendation to change their initial passwords".

Product(s) Impacted

Vendor Product Versions
Sony
  • Snc-m1
  • Snc-m3
  • Snc-rz25n
  • Snc-rz30n
  • Snc-ds10
  • Snc-cs3n
  • Snc-rx570n
  • <1.30
  • <1.30
  • <1.30
  • <1.30
  • <1.30
  • <1.30
  • <1.30

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-1392
Use of Default Credentials
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a sony snc-m1 <1.30 / / / / / / /
a sony snc-m3 <1.30 / / / / / / /
a sony snc-rz25n <1.30 / / / / / / /
a sony snc-rz30n <1.30 / / / / / / /
a sony snc-ds10 <1.30 / / / / / / /
a sony snc-cs3n <1.30 / / / / / / /
a sony snc-rx570n <1.30 / / / / / / /

CVSS Score

9.2 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Attack Requirements: NONE
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: May 24, 2025, 1:15 p.m.
Last Modified: May 24, 2025, 1:15 p.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

cna@vuldb.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.