A vulnerability classified as critical has been found in Sony SNC-M1, SNC-M3, SNC-RZ25N, SNC-RZ30N, SNC-DS10, SNC-CS3N and SNC-RX570N up to 1.30. This affects an unknown part of the component Administrative Interface. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. It is recommended to change the configuration settings. The vendor was contacted early about this issue. They confirmed the existence but pointed out that they "have published the 'Hardening Guide' on the Web from July 2018 to January 2025 and have thoroughly informed customers of the recommendation to change their initial passwords".
References
Configurations
No configuration.
History
28 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zeke2997/CVE_request_Sony - |
28 May 2025, 14:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 May 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-24 13:15
Updated : 2025-05-28 18:15
NVD link : CVE-2025-5124
Mitre link : CVE-2025-5124
CVE.ORG link : CVE-2025-5124
JSON object : View
Products Affected
No product.
CWE
CWE-1392
Use of Default Credentials