A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Tue, 08 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-798 | |
| Metrics | cvssV3_1 
 
 | 
Mon, 07 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2025-07-07T00:00:00.000Z
Updated: 2025-07-08T17:37:23.903Z
Reserved: 2025-06-17T00:00:00.000Z
Link: CVE-2025-52492
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-07T19:44:01.256Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-07T16:15:24.233
Modified: 2025-07-08T18:15:40.190
Link: CVE-2025-52492
 Redhat
                        Redhat
                    No data.