Description
HCL AION is affected by a vulnerability where adequate protections against brute-force attempts are not enforced. This may allow repeated authentication attempts, potentially leading to unauthorized access or account compromise under certain conditions.
Published: 2026-05-14
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in HCL AION allows insufficient protection against repeated authentication attempts, enabling brute‑force attacks. Because authentication checks do not enforce account lockout or rate limiting, an attacker could repeatedly try credentials, potentially gaining access to user accounts or compromising systems if weak passwords are used. This leads to a compromise of confidentiality, integrity, and availability of the targeted accounts.

Affected Systems

The issue affects the HCL AION product from HCL. No specific version information is provided, so all deployed instances should be considered potentially impacted until a vendor‑issued fix becomes available.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not currently listed in CISA’s KEV catalog. Based on the description, the likely attack vector is remote, involving repeated login attempts against the application’s authentication interface. The risk escalates if weak passwords or lack of multi‑factor authentication are present. Without mitigating controls such as rate limiting or lockout, the exploitation confidence is reasonably high under typical conditions.

Generated by OpenCVE AI on May 14, 2026 at 18:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a version of HCL AION that incorporates the fix for inadequate brute‑force protections.
  • Enable and configure account lockout or rate‑limiting settings for authentication attempts to limit the number of failed login attempts per account or per IP address.
  • Enable multi‑factor authentication for all user accounts to add an additional layer of verification and reduce the likelihood of a successful brute‑force compromise.

Generated by OpenCVE AI on May 14, 2026 at 18:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Hcl
Hcl aion
Vendors & Products Hcl
Hcl aion

Thu, 14 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description HCL AION is affected by a vulnerability where adequate protections against brute-force attempts are not enforced. This may allow repeated authentication attempts, potentially leading to unauthorized access or account compromise under certain conditions.
Title HCL AION is affected by a vulnerability where adequate protections against brute-force attempts are not enforced.
Weaknesses CWE-307
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HCL

Published:

Updated: 2026-05-14T18:29:09.123Z

Reserved: 2025-10-10T09:04:16.878Z

Link: CVE-2025-62313

cve-icon Vulnrichment

Updated: 2026-05-14T18:29:01.743Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T17:16:18.660

Modified: 2026-05-14T17:22:46.577

Link: CVE-2025-62313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T18:30:26Z

Weaknesses