A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
History

Tue, 08 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-798
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 07 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-07-07T00:00:00.000Z

Updated: 2025-07-08T17:37:23.903Z

Reserved: 2025-06-17T00:00:00.000Z

Link: CVE-2025-52492

cve-icon Vulnrichment

Updated: 2025-07-07T19:44:01.256Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-07T16:15:24.233

Modified: 2025-07-08T18:15:40.190

Link: CVE-2025-52492

cve-icon Redhat

No data.