Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
History

Wed, 27 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Agiloft
Agiloft agiloft
Vendors & Products Agiloft
Agiloft agiloft

Tue, 26 Aug 2025 22:30:00 +0000

Type Values Removed Values Added
Description Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
Title Agiloft local privilege escalation via default credentials
Weaknesses CWE-1392
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published: 2025-08-26T22:18:12.127Z

Updated: 2025-08-26T22:18:12.127Z

Reserved: 2025-04-15T20:56:24.416Z

Link: CVE-2025-35114

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-08-26T23:15:35.377

Modified: 2025-08-26T23:15:35.377

Link: CVE-2025-35114

cve-icon Redhat

No data.