Impact
The vulnerability exists in the netbox-docker container image before version 2.5.0, where a superuser account is created with a default administrator password and a documented default API token (0123456789abcdef0123456789abcdef01234567). Key detail from vendor description: "netbox-docker before 2.5.0 has a superuser account with default credentials." An attacker who can reach the exposed NetBox instance can log in using these credentials and gain full administrative control, allowing manipulation of network data and configuration. The weakness is a credential disclosure (CWE‑1392).
Affected Systems
All releases of netbox-community:netbox-docker prior to version 2.5.0 are affected. The product documentation states defaults must not be used, but their enforcement is missing.
Risk and Exploitability
The vulnerability has a CVSS score of 9 (critical) and an EPSS less than 1 %. It is not listed in the CISA KEV catalog. The attack vector is remote over the network where the container is reachable, requiring only the default credentials. Typical installations with default values pose a high impact risk. While exploitation likelihood in the wild appears low, the potential for full administrative takeover makes prompt remediation essential.
OpenCVE Enrichment