Description
Solstice Pod API (version 5.5, 6.2) contains an unauthenticated API endpoint (`/api/config`) that exposes sensitive information such as the session key, server version, product details, and display name. Unauthorized users can extract live session information by accessing this endpoint without authentication.
Published: 2025-12-04
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure through unauthenticated API endpoint
Action: Apply Patch
AI Analysis

Impact

The vulnerability involves an unauthenticated API endpoint (/api/config) that returns sensitive data such as a session key, server version, product details, and display name. Exposing the session key can allow an attacker to hijack active sessions or forge authenticated requests, effectively compromising confidentiality and potentially enabling further malicious actions.

Affected Systems

The affected product is Mersive Solstice Pod. Vulnerable firmware versions include 5.5 and 6.2; the description also mentions firmware 5.6, implying that earlier releases are at risk. All devices running these firmware versions are exposed.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Attackers can reach the endpoint over the network, potentially without any preliminary authentication, making exploitation straightforward for anyone with network visibility to the device.

Generated by OpenCVE AI on April 22, 2026 at 20:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Mersive to eliminate the exposure of the /api/config endpoint
  • If an update is not yet available, restrict network access to the Solstice Pod so that only trusted management addresses can reach the /api/config endpoint, or block the endpoint using a firewall or network ACL
  • Configure the device to require authentication for API calls or disable the unauthenticated API feature altogether

Generated by OpenCVE AI on April 22, 2026 at 20:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 23 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Mersive solstice Pod Firmware
CPEs cpe:2.3:h:mersive:solstice_pod:-:*:*:*:*:*:*:*
cpe:2.3:o:mersive:solstice_pod_firmware:5.6:*:*:*:*:*:*:*
cpe:2.3:o:mersive:solstice_pod_firmware:6.2:*:*:*:*:*:*:*
Vendors & Products Mersive solstice Pod Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 05 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Mersive
Mersive solstice Pod
Vendors & Products Mersive
Mersive solstice Pod

Thu, 04 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description Solstice Pod API (version 5.5, 6.2) contains an unauthenticated API endpoint (`/api/config`) that exposes sensitive information such as the session key, server version, product details, and display name. Unauthorized users can extract live session information by accessing this endpoint without authentication.
Title Solstice Pod API Session Key Extraction via API Endpoint
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Mersive Solstice Pod Solstice Pod Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:51.175Z

Reserved: 2025-12-04T16:22:24.337Z

Link: CVE-2025-66573

cve-icon Vulnrichment

Updated: 2025-12-05T17:52:03.261Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-04T21:16:10.083

Modified: 2025-12-23T00:09:25.047

Link: CVE-2025-66573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:00:06Z

Weaknesses