Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
Metrics
Affected Vendors & Products
References
History
Tue, 02 Sep 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Atlassian
Atlassian agiloft |
|
| CPEs | cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Atlassian
Atlassian agiloft |
Fri, 29 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agiloft
Agiloft agiloft |
|
| Vendors & Products |
Agiloft
Agiloft agiloft |
Tue, 26 Aug 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30. | |
| Title | Agiloft local privilege escalation via default credentials | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-08-26T22:18:12.127Z
Updated: 2025-08-29T18:29:07.509Z
Reserved: 2025-04-15T20:56:24.416Z
Link: CVE-2025-35114
Updated: 2025-08-29T18:29:03.053Z
Status : Analyzed
Published: 2025-08-26T23:15:35.377
Modified: 2025-09-02T17:58:00.227
Link: CVE-2025-35114
No data.