CWE-258
Empty Password in Configuration File
Using an empty string as a password is insecure.
CVE-2025-4395 (GCVE-0-2025-4395)
Vulnerability from cvelistv5
Published
2025-07-24 03:30
Modified
2025-07-24 13:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-258 - Empty Password in Configuration File
Summary
Medtronic MyCareLink Patient Monitor has a built-in user account with an empty password, which allows an attacker with physical access to log in with no password and access modify system functionality.
This issue affects MyCareLink Patient Monitor models 24950 and 24952: before June 25, 2025
References
▼ | URL | Tags |
---|---|---|
https://global.medtronic.com/xg-en/product-security/security-bulletins.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Medtronic | MyCareLink Patient Monitor 24950 |
Version: 0 < June 25, 2025 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4395", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-24T13:18:46.616820Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-24T13:18:56.146Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MyCareLink Patient Monitor 24950", "vendor": "Medtronic", "versions": [ { "lessThan": "June 25, 2025", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "MyCareLink Patient Monitor 24952", "vendor": "Medtronic", "versions": [ { "lessThan": "June 25, 2025", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Ethan Morchy, with Somerset Recon" }, { "lang": "en", "type": "finder", "value": "Carl Mann, independent researcher" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Medtronic MyCareLink Patient Monitor has a built-in user account with an empty password, which allows an attacker with physical access to log in with no password and access modify system functionality. \u003cbr\u003e\u003cbr\u003eThis issue affects MyCareLink Patient Monitor models 24950 and 24952: before June 25, 2025\u003cbr\u003e" } ], "value": "Medtronic MyCareLink Patient Monitor has a built-in user account with an empty password, which allows an attacker with physical access to log in with no password and access modify system functionality. \n\nThis issue affects MyCareLink Patient Monitor models 24950 and 24952: before June 25, 2025" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-258", "description": "CWE-258 Empty Password in Configuration File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-24T03:30:24.185Z", "orgId": "3c337f33-b2bd-4529-9792-f48cdb2838b4", "shortName": "Medtronic" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://global.medtronic.com/xg-en/product-security/security-bulletins.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Medtronic MyCareLink Patient Monitor Empty Password Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c337f33-b2bd-4529-9792-f48cdb2838b4", "assignerShortName": "Medtronic", "cveId": "CVE-2025-4395", "datePublished": "2025-07-24T03:30:24.185Z", "dateReserved": "2025-05-06T20:01:00.625Z", "dateUpdated": "2025-07-24T13:18:56.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-9276 (GCVE-0-2025-9276)
Vulnerability from cvelistv5
Published
2025-09-02 20:00
Modified
2025-09-03 15:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-258 - Empty Password in Configuration File
Summary
Cockroach Labs cockroach-k8s-request-cert Empty Root Password Authentication Bypass Vulnerability. This vulnerability could allow remote attackers to bypass authentication on systems that use the affected version of the Cockroach Labs cockroach-k8s-request-cert container image.
The specific flaw exists within the configuration of the system shadow file. The issue results from a blank password setting for the root user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-22195.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-855/ | x_research-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cockroach Labs | cockroach-k8s-request-cert |
Version: cockroachdb/cockroach-k8s-request-cert:latest |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9276", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-03T15:32:33.378336Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-03T15:32:42.164Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "cockroach-k8s-request-cert", "vendor": "Cockroach Labs", "versions": [ { "status": "affected", "version": "cockroachdb/cockroach-k8s-request-cert:latest" } ] } ], "dateAssigned": "2025-08-20T18:14:23.444Z", "datePublic": "2025-08-27T14:10:18.840Z", "descriptions": [ { "lang": "en", "value": "Cockroach Labs cockroach-k8s-request-cert Empty Root Password Authentication Bypass Vulnerability. This vulnerability could allow remote attackers to bypass authentication on systems that use the affected version of the Cockroach Labs cockroach-k8s-request-cert container image.\n\nThe specific flaw exists within the configuration of the system shadow file. The issue results from a blank password setting for the root user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-22195." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-258", "description": "CWE-258: Empty Password in Configuration File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-02T20:00:51.838Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-25-855", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-855/" } ], "source": { "lang": "en", "value": "Alfredo de Oliveira - Trend Micro Nebula Team" }, "title": "Cockroach Labs cockroach-k8s-request-cert Empty Root Password Authentication Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2025-9276", "datePublished": "2025-09-02T20:00:51.838Z", "dateReserved": "2025-08-20T18:14:23.415Z", "dateUpdated": "2025-09-03T15:32:42.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: System Configuration
Description:
- Passwords should be at least eight characters long -- the longer the better. Avoid passwords that are in any way similar to other passwords you have. Avoid using words that may be found in a dictionary, names book, on a map, etc. Consider incorporating numbers and/or punctuation into your password. If you do use common words, consider replacing letters in that word with numbers and punctuation. However, do not use "similar-looking" punctuation. For example, it is not a good idea to change cat to c@t, ca+, (@+, or anything similar. Finally, it is never appropriate to use an empty string as a password.
No CAPEC attack patterns related to this CWE.