Impact
PrismX MX100 AP controller includes an Insufficiently Protected Credentials flaw that permits authenticated remote attackers with privileged access to harvest SMTP plaintext passwords via the web interface. This leads to unauthorized disclosure of credentials used for SMTP services. The weakness does not enable arbitrary code execution or denial of service but can compromise confidentiality of SMTP passwords and potentially allow attackers to relay mail, impersonate users, or compromise downstream systems.
Affected Systems
The impacted system is the BROWAN COMMUNICATIONS PrismX MX100 AP controller. No specific firmware versions are enumerated in the advisory, so the risk applies across the product line until an official firmware update is applied.
Risk and Exploitability
The CVSS score of 6.9 labels the issue as medium severity, and the EPSS score below 1% indicates a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires remote authentication via the web console; an attacker who has logged in with privileged credentials can then download the SMTP plaintext passwords. Therefore, mitigation should focus on patching and network segmentation.
OpenCVE Enrichment