Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.
Fixes

Solution

Upgrade to Axxon One 3.15.0 or later, where TRACE logging no longer records plaintext passwords and instead uses masked/encoded values. As an additional mitigation, administrators should: * avoid enabling TRACE logging in production environments, * rotate credentials if TRACE logging had been previously enabled.


Workaround

No workaround given by the vendor.

History

Wed, 10 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.
Title Hardcoded Password Exposure in AxxonNet ARP Agent Logs
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AxxonSoft

Published:

Updated: 2025-09-10T13:49:09.874Z

Reserved: 2025-09-10T12:31:11.920Z

Link: CVE-2025-10221

cve-icon Vulnrichment

Updated: 2025-09-10T13:47:58.279Z

cve-icon NVD

Status : Received

Published: 2025-09-10T13:15:35.590

Modified: 2025-09-10T13:15:35.590

Link: CVE-2025-10221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.