Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
Metrics
Affected Vendors & Products
References
History
Wed, 27 Aug 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Agiloft
Agiloft agiloft |
|
Vendors & Products |
Agiloft
Agiloft agiloft |
Tue, 26 Aug 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30. | |
Title | Agiloft local privilege escalation via default credentials | |
Weaknesses | CWE-1392 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-08-26T22:18:12.127Z
Updated: 2025-08-26T22:18:12.127Z
Reserved: 2025-04-15T20:56:24.416Z
Link: CVE-2025-35114

No data.

Status : Received
Published: 2025-08-26T23:15:35.377
Modified: 2025-08-26T23:15:35.377
Link: CVE-2025-35114

No data.