{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-35114","assignerOrgId":"9119a7d8-5eab-497f-8521-727c672e3725","state":"PUBLISHED","assignerShortName":"cisa-cg","dateReserved":"2025-04-15T20:56:24.416Z","datePublished":"2025-08-26T22:18:12.127Z","dateUpdated":"2025-08-29T18:29:07.509Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30."}],"affected":[{"vendor":"Agiloft","product":"Agiloft","defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"Release 30","versionType":"custom"},{"version":"Release 30","status":"unaffected"}]}],"problemTypes":[{"descriptions":[{"description":"CWE-1392 Use of Default Credentials","lang":"en","type":"CWE","cweId":"CWE-1392"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"cvssV4_0":{"version":"4.0","baseScore":8.7,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N","userInteraction":"NONE","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","subIntegrityImpact":"NONE","vulnIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","vulnConfidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-08-26T21:59:31.501064Z","id":"CVE-2025-35114","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"Agiloft local privilege escalation via default credentials","references":[{"name":"url","url":"https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution"},{"name":"url","url":"https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json"},{"name":"url","url":"https://www.cve.org/CVERecord?id=CVE-2025-35114"}],"credits":[{"value":"Matthew Galligan, CISA Rapid Action Force (RAF)","lang":"en"}],"datePublic":"2025-08-26T00:00:00.000Z","providerMetadata":{"orgId":"9119a7d8-5eab-497f-8521-727c672e3725","shortName":"cisa-cg","dateUpdated":"2025-08-26T22:18:12.127Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-29T18:28:30.855774Z","id":"CVE-2025-35114","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-29T18:29:07.509Z"}}]}}