Executive Summary

Informations
Name CVE-2025-5124 First vendor Publication 2025-05-24
Vendor Cve Last vendor Modification 2025-05-28

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability classified as critical has been found in Sony SNC-M1, SNC-M3, SNC-RZ25N, SNC-RZ30N, SNC-DS10, SNC-CS3N and SNC-RX570N up to 1.30. This affects an unknown part of the component Administrative Interface. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. It is recommended to change the configuration settings. The vendor was contacted early about this issue. They confirmed the existence but pointed out that they "have published the 'Hardening Guide' on the Web from July 2018 to January 2025 and have thoroughly informed customers of the recommendation to change their initial passwords".

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5124

Sources (Detail)

https://github.com/zeke2997/CVE_request_Sony
https://github.com/zeke2997/CVE_request_Sony#3-poc
https://vuldb.com/?ctiid.310203
https://vuldb.com/?id.310203
https://vuldb.com/?submit.564839
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-05-29 00:21:54
  • Multiple Updates
2025-05-26 21:20:36
  • First insertion