{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2018-25236","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-04-03T17:10:57.779Z","datePublished":"2026-04-03T22:44:43.486Z","dateUpdated":"2026-05-14T02:06:32.230Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-05-14T02:06:32.230Z"},"title":"Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management","descriptions":[{"lang":"en","value":"Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials."}],"datePublic":"2018-05-25T00:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-287","description":"Improper Authentication (CWE-287)","type":"CWE"}]}],"affected":[{"vendor":"Belden","product":"Hirschmann HiOS","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"05.07"},{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"06.1.04"},{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"06.2.00"},{"status":"unaffected","version":"06.1.05","versionType":"custom"},{"status":"unaffected","version":"07.0.00","versionType":"custom"},{"status":"unaffected","version":"03.1.00","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Belden","product":"Hirschmann HiSecOS EAGLE","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"03.00.02"},{"status":"unaffected","version":"03.0.03","versionType":"custom"}],"defaultStatus":"unaffected"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","version":"3.1","baseSeverity":"CRITICAL","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"CRITICAL","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}}],"references":[{"url":"https://assets.belden.com/m/52ecadbb5f1b0e04/original/Security-Bulletin-Web-Server-Authentication-Bypass-HiOS-HiSecOS-Hirschmann-BSECV-2018-05.pdf","tags":["vendor-advisory"]},{"url":"https://www.vulncheck.com/advisories/hirschmann-hios-hisecos-authentication-bypass-via-http-management"}],"source":{"discovery":"EXTERNAL"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-06T15:03:07.891866Z","id":"CVE-2018-25236","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-06T15:29:05.743Z"}}]}}