{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25601","assignerOrgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","state":"PUBLISHED","assignerShortName":"ENISA","dateReserved":"2026-02-03T07:24:49.548Z","datePublished":"2026-04-01T11:28:57.110Z","dateUpdated":"2026-04-01T12:35:48.644Z"},"containers":{"cna":{"providerMetadata":{"orgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","shortName":"ENISA","dateUpdated":"2026-04-01T11:28:57.110Z"},"title":"Credential Exposure vulnerability in MEPIS RM","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-798","description":"CWE-798: Use of Hard-coded Credentials","type":"CWE"}]}],"affected":[{"vendor":"Metronik d.o.o.","product":"MEPIS RM","versions":[{"status":"affected","version":"0","lessThan":"8.2.0107","versionType":"semver"},{"status":"affected","version":"0","lessThan":"8.2.0007 build 15","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in MEPIS RM, an industrial\nsoftware product developed by Metronik. The application contained a hardcoded\ncryptographic key within the Mx.Web.ComponentModel.dll component. When the\noption to store domain passwords was enabled, this key was used to encrypt user\npasswords before storing them in the application’s database. An attacker with\nsufficient privileges to access the database could extract the encrypted\npasswords, decrypt them using the embedded key, and gain unauthorized access to\nthe associated ICS/OT environment.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A vulnerability was identified in MEPIS RM, an industrial\nsoftware product developed by Metronik. The application contained a hardcoded\ncryptographic key within the Mx.Web.ComponentModel.dll component. When the\noption to store domain passwords was enabled, this key was used to encrypt user\npasswords before storing them in the application’s database. An attacker with\nsufficient privileges to access the database could extract the encrypted\npasswords, decrypt them using the embedded key, and gain unauthorized access to\nthe associated ICS/OT environment.</p>"}]}],"references":[{"url":"https://www.cert.si/en/cve-2026-25601/","tags":["third-party-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":6.4,"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-01T12:34:39.978813Z","id":"CVE-2026-25601","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-01T12:35:48.644Z"}}]}}