No analysis available yet.
Vendor Solution
Sunbird recommends that users take the following actions: * dcTrack: Update to 9.2.3 * Power: Update to IQ 9.2.1
Vendor Workaround
If updating immediately is not possible, Sunbird additionally recommends that customers: * Restrict SSH or any non-essential port access in the IP Based Access Control. * Passwords for SSH based user accounts be changed at the time of deployment.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 05 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sunbirddcim
Sunbirddcim dctrack Sunbirddcim power Iq |
|
| Vendors & Products |
Sunbirddcim
Sunbirddcim dctrack Sunbirddcim power Iq |
Thu, 04 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DCIM dcTrack allows an attacker to misuse certain remote access features. An authenticated user with access to the appliance's virtual console could exploit these features to redirect network traffic, potentially accessing restricted services or data on the host machine. | |
| Title | Sunbird DCIM dcTrack and Power IQ Authentication Bypass Using an Alternate Path or Channel | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-05T17:01:14.562Z
Reserved: 2025-11-25T17:32:15.110Z
Link: CVE-2025-66238
Updated: 2025-12-05T17:01:11.411Z
Status : Awaiting Analysis
Published: 2025-12-04T22:15:49.320
Modified: 2025-12-08T18:27:15.857
Link: CVE-2025-66238
No data.
OpenCVE Enrichment
Updated: 2025-12-05T10:52:07Z