Metrics
Affected Vendors & Products
No advisories yet.
Solution
Sunbird recommends that users take the following actions: * dcTrack: Update to 9.2.3 * Power: Update to IQ 9.2.1
Workaround
If updating immediately is not possible, Sunbird additionally recommends that customers: * Restrict SSH or any non-essential port access in the IP Based Access Control. * Passwords for SSH based user accounts be changed at the time of deployment.
Fri, 05 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sunbirddcim
Sunbirddcim dctrack Sunbirddcim power Iq |
|
| Vendors & Products |
Sunbirddcim
Sunbirddcim dctrack Sunbirddcim power Iq |
Thu, 04 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DCIM dcTrack allows an attacker to misuse certain remote access features. An authenticated user with access to the appliance's virtual console could exploit these features to redirect network traffic, potentially accessing restricted services or data on the host machine. | |
| Title | Sunbird DCIM dcTrack and Power IQ Authentication Bypass Using an Alternate Path or Channel | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-05T17:01:14.562Z
Reserved: 2025-11-25T17:32:15.110Z
Link: CVE-2025-66238
Updated: 2025-12-05T17:01:11.411Z
Status : Received
Published: 2025-12-04T22:15:49.320
Modified: 2025-12-04T22:15:49.320
Link: CVE-2025-66238
No data.
OpenCVE Enrichment
Updated: 2025-12-05T10:52:07Z