DCIM dcTrack platforms utilize default and hard-coded credentials for access. An attacker could use these credentials to administer the database, escalate privileges on the platform or execute system commands on the host.
Advisories

No advisories yet.

Fixes

Solution

Sunbird recommends that users take the following actions: * dcTrack: Update to 9.2.3 * Power: Update to IQ 9.2.1


Workaround

If updating immediately is not possible, Sunbird additionally recommends that customers: * Restrict SSH or any non-essential port access in the IP Based Access Control. * Passwords for SSH based user accounts be changed at the time of deployment.

History

Thu, 04 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description DCIM dcTrack platforms utilize default and hard-coded credentials for access. An attacker could use these credentials to administer the database, escalate privileges on the platform or execute system commands on the host.
Title Sunbird DCIM dcTrack and Power IQ Use of Hard-coded Credentials
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-04T21:02:59.614Z

Reserved: 2025-11-25T17:32:15.110Z

Link: CVE-2025-66237

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-04T21:16:09.137

Modified: 2025-12-04T21:16:09.137

Link: CVE-2025-66237

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses