CVE-2025-6523

July 22, 2025, 7:15 p.m.

7.7
High

Description

Use of weak credentials in emergency authentication component in Devolutions Server allows an unauthenticated attacker to bypass authentication via brute forcing the short emergency codes generated by the server within a feasible timeframe. This issue affects the following versions : * Devolutions Server 2025.2.2.0 through 2025.2.3.0 * Devolutions Server 2025.1.11.0 and earlier

Product(s) Impacted

Vendor Product Versions
Devolutions
  • Devolutions Server
  • 2025.2.2.0-2025.2.3.0, 2025.1.11.0

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-1391
Use of Weak Credentials
The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a devolutions devolutions_server 2025.2.2.0-2025.2.3.0 / / / / / / /
a devolutions devolutions_server 2025.1.11.0 / / / / / / /

CVSS Score

7.7 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: NONE
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

    View Vector String

Timeline

Published: July 22, 2025, 5:15 p.m.
Last Modified: July 22, 2025, 7:15 p.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security@devolutions.net

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.