Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
History

Tue, 02 Sep 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Atlassian
Atlassian agiloft
CPEs cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:*
Vendors & Products Atlassian
Atlassian agiloft

Fri, 29 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Agiloft
Agiloft agiloft
Vendors & Products Agiloft
Agiloft agiloft

Tue, 26 Aug 2025 22:30:00 +0000

Type Values Removed Values Added
Description Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
Title Agiloft local privilege escalation via default credentials
Weaknesses CWE-1392
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2025-08-29T18:29:07.509Z

Reserved: 2025-04-15T20:56:24.416Z

Link: CVE-2025-35114

cve-icon Vulnrichment

Updated: 2025-08-29T18:29:03.053Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-26T23:15:35.377

Modified: 2025-09-02T17:58:00.227

Link: CVE-2025-35114

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-27T11:41:35Z