Description
BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using default credentials, upload a malicious Java archive as a web service, and execute arbitrary commands on the host via SOAP requests to the deployed service.
Published: 2026-04-24
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via default credentials
Action: Immediate Patch
AI Analysis

Impact

BridgeHead FileStore versions earlier than 24A expose the Apache Axis2 administration module on network‑accessible endpoints. Attackers can log in with the hard‑coded default credentials, upload a malicious Java archive as a web service, and then issue SOAP requests that cause the host to execute arbitrary OS commands. The vulnerability stems from insecure default authentication (CWE‑1188) and remote code execution via web services (CWE‑1391). The impact includes full compromise of confidentiality, integrity, and availability on the affected system, as the attacker can run any command with the privileges of the service process.

Affected Systems

BridgeHead Software FileStore versions prior to 24A. The affected product uses the Apache Axis2 framework for its administration console, and the security issue is present in all instances of the product released before the 24A update.

Risk and Exploitability

The CVSS score of 9.3 places this issue in the critical severity range. The EPSS score of less than 1% indicates a very low probability of exploitation in the wild, and the vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector is network‑based, requiring an unauthenticated user to access the exposed administration endpoint, which is typically reachable from external IP addresses. The existence of default credentials is a prerequisite for exploitation, and no additional setup beyond remote access is described in the advisory.

Generated by OpenCVE AI on April 28, 2026 at 06:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BridgeHead FileStore to version 24A or later, which removes the exposed administration module and eliminates default credentials.
  • If an upgrade is not immediately possible, block external network access to the Axis2 administration endpoint or restrict it to a trusted internal network segment.
  • Change the default administrator username and password to a strong, unique credential and enforce a password policy that requires complexity and periodic rotation.

Generated by OpenCVE AI on April 28, 2026 at 06:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Bridgehead Software
Bridgehead Software filestore
Vendors & Products Bridgehead Software
Bridgehead Software filestore

Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using default credentials, upload a malicious Java archive as a web service, and execute arbitrary commands on the host via SOAP requests to the deployed service.
Title BridgeHead FileStore < 24A Apache Axis2 Default Credentials RCE
Weaknesses CWE-1188
CWE-1391
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Bridgehead Software Filestore
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-24T18:17:02.370Z

Reserved: 2026-04-07T20:57:06.210Z

Link: CVE-2026-39920

cve-icon Vulnrichment

Updated: 2026-04-24T17:26:00.534Z

cve-icon NVD

Status : Deferred

Published: 2026-04-24T16:16:36.267

Modified: 2026-04-24T17:55:55.317

Link: CVE-2026-39920

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T06:15:24Z

Weaknesses