A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-798 | |
Metrics |
cvssV3_1
|
Mon, 07 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-07T00:00:00.000Z
Updated: 2025-07-08T17:37:23.903Z
Reserved: 2025-06-17T00:00:00.000Z
Link: CVE-2025-52492

Updated: 2025-07-07T19:44:01.256Z

Status : Awaiting Analysis
Published: 2025-07-07T16:15:24.233
Modified: 2025-07-08T18:15:40.190
Link: CVE-2025-52492

No data.