Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet / C-WerkNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.

Project Subscriptions

Vendors Products
Axxonsoft Subscribe
Axxon One Subscribe
Microsoft Subscribe
Windows Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-27543 Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.
Fixes

Solution

Upgrade to Axxon One 3.15.0 (C-Werk) or later, where TRACE logging no longer records plaintext passwords and instead uses masked/encoded values. As an additional mitigation, administrators should: * avoid enabling TRACE logging in production environments, * rotate credentials if TRACE logging had been previously enabled.


Workaround

No workaround given by the vendor.

History

Fri, 19 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Axxonsoft
Axxonsoft axxon One
CPEs cpe:2.3:a:axxonsoft:axxon_one:*:*:*:*:*:windows:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Axxonsoft
Axxonsoft axxon One

Wed, 08 Oct 2025 12:15:00 +0000

Type Values Removed Values Added
Title Hardcoded Password Exposure in AxxonNet ARP Agent Logs Hardcoded Password Exposure in AxxonNet (C-WerkNet) ARP Agent Logs

Wed, 08 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords. Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet / C-WerkNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.

Thu, 11 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Vendors & Products Microsoft
Microsoft windows

Wed, 10 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.
Title Hardcoded Password Exposure in AxxonNet ARP Agent Logs
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AxxonSoft

Published:

Updated: 2025-10-08T12:02:15.274Z

Reserved: 2025-09-10T12:31:11.920Z

Link: CVE-2025-10221

cve-icon Vulnrichment

Updated: 2025-09-10T13:47:58.279Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-10T13:15:35.590

Modified: 2025-12-19T14:24:48.670

Link: CVE-2025-10221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-11T10:42:44Z

Weaknesses