Description
HCL Aftermarket DPC is affected by Weak Password Policy vulnerability, which makes it easier for attackers to guess weak passwords or use brute-force techniques to gain unauthorized access to user accounts.
Published: 2026-03-26
Score: 4.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized account access through weak password
Action: Update
AI Analysis

Impact

HCL Aftermarket DPC contains a weak password policy that allows attackers to guess or brute‑force user credentials. The vulnerability can lead to unauthorized logins, enabling attackers to use the compromised accounts for further attacks or to access sensitive data. This weakness is classified as CWE-521. The CVSS score of 4.2 indicates a moderate severity. No further impact such as data exfiltration or remote code execution is documented.

Affected Systems

The affected product is HCL Aftermarket DPC. The vendor is HCL, and the specific product name is Aftermarket DPC. No version range is provided in the CNA data. Users of any installation of this product should verify whether a current patch or security update addresses the weak password policy. If the exact version is unknown, all deployments of the product should be inspected for this configuration issue.

Risk and Exploitability

The CVSS score of 4.2 indicates that the vulnerability is moderate but can still enable attackers to obtain privileged access if passwords are weak. The EPSS score is not available, so the likelihood of exploitation cannot be quantified, and the vulnerability is not listed in the CISA KEV catalogue. Because the weakness is a password policy issue, the likely attack vector is remote: an attacker can launch a brute‑force or credential‑guessing attack against the login interface. The vulnerability does not require advanced privileges or system compromise to be exploited. It is therefore considered a low–to‑moderate threat for systems that employ default or weak passwords.

Generated by OpenCVE AI on March 26, 2026 at 21:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any HCL release that addresses the weak password policy.
  • If no patch is available, manually enforce a strong password policy, requiring complexity and minimum length.
  • Configure account lockout after a set number of failed login attempts.
  • Disable or rename default or easily guessable accounts.
  • Monitor login logs for repeated failed attempts and investigate suspicious activity.

Generated by OpenCVE AI on March 26, 2026 at 21:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Hcl
Hcl aftermarket Dpc
Vendors & Products Hcl
Hcl aftermarket Dpc

Thu, 26 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Hcltech
Hcltech aftermarket Cloud
CPEs cpe:2.3:a:hcltech:aftermarket_cloud:1.0.0:*:*:*:*:*:*:*
Vendors & Products Hcltech
Hcltech aftermarket Cloud

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description HCL Aftermarket DPC is affected by Weak Password Policy vulnerability, which makes it easier for attackers to guess weak passwords or use brute-force techniques to gain unauthorized access to user accounts.
Title HCL Aftermarket DPC is affected by Weak Password Policy vulnerability
Weaknesses CWE-521
References
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L'}


Subscriptions

Hcl Aftermarket Dpc
Hcltech Aftermarket Cloud
cve-icon MITRE

Status: PUBLISHED

Assigner: HCL

Published:

Updated: 2026-03-26T15:01:29.232Z

Reserved: 2025-08-12T07:00:17.741Z

Link: CVE-2025-55269

cve-icon Vulnrichment

Updated: 2026-03-26T13:40:49.322Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T13:16:26.253

Modified: 2026-03-26T20:33:42.567

Link: CVE-2025-55269

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:28:30Z

Weaknesses