Description
Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials.
Published: 2026-04-03
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass enabling administrator-level access
Action: Patch Immediately
AI Analysis

Impact

An authentication bypass flaw in the HTTP(S) management interface of Hirschmann HiOS and HiSecOS allows an unauthenticated attacker to craft requests that reveal the authentication status of a user who had previously logged in. The flaw stems from improper enforcement of authentication checks, mapping to CWE‑287. If exploited, the attacker can gain administrative privileges on the system, potentially compromising confidentiality, integrity, and availability of the device.

Affected Systems

The vulnerability affects Belden Hirschmann HiOS and HiSecOS EAGLE products. Specific series impacted include RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, and the EAGLE management platform. No version ranges are stated in the available data.

Risk and Exploitability

With a CVSS score of 9.3, the flaw is considered critical. Although EPSS data is not available, the absence of a known exploit in the KEV catalog does not mitigate the risk. The likely attack vector is a remote HTTP(S) request to the management interface, and the vulnerability can be triggered without credentials or prior user interaction, making it straightforward for attackers to obtain full administrative control.

Generated by OpenCVE AI on April 4, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest security patch for Hirschmann HiOS and HiSecOS as distributed by Belden.
  • If an official patch is unavailable or delayed, restrict external access to the HTTP management interface or place it behind a secure VPN or firewall.
  • Verify that authentication mechanisms are enabled on the web server and that the device is not accepting unauthenticated requests.
  • Review device logs for unexpected authentication status responses and investigate any anomalies.

Generated by OpenCVE AI on April 4, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Belden
Belden hirschmann Hios
Belden hirschmann Hisecos
Vendors & Products Belden
Belden hirschmann Hios
Belden hirschmann Hisecos

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials.
Title Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Belden Hirschmann Hios Hirschmann Hisecos
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T15:29:05.743Z

Reserved: 2026-04-03T17:10:57.779Z

Link: CVE-2018-25236

cve-icon Vulnrichment

Updated: 2026-04-06T15:03:15.192Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T23:17:00.823

Modified: 2026-04-07T13:20:55.200

Link: CVE-2018-25236

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:21:38Z

Weaknesses