Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26410: CWE-798 Use of Hard-coded Credentials in Wattsense Wattsense Bridge

0
Critical
VulnerabilityCVE-2025-26410cvecve-2025-26410cwe-798
Published: Tue Feb 11 2025 (02/11/2025, 09:20:22 UTC)
Source: CVE Database V5
Vendor/Project: Wattsense
Product: Wattsense Bridge

Description

The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP >= 6.4.1.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:07:55 UTC

Technical Analysis

The vulnerability identified as CVE-2025-26410 affects Wattsense Bridge devices, which are used primarily for building automation and energy management. The root cause is the presence of hard-coded credentials for both user and root accounts embedded in the device firmware. These credentials are identical across all affected devices, making them a prime target for attackers. The user password can be recovered through offline password cracking techniques, given that the password hashes or encrypted forms are accessible. Once the credentials are obtained, an attacker can log into the device via the exposed login shell accessible through the serial interface. This interface is typically used for maintenance or debugging but is insufficiently protected in affected versions. The vulnerability allows an attacker with physical or network access to the serial interface to gain full control over the device without any authentication or user interaction. This can lead to unauthorized access, manipulation of device functions, disruption of building management systems, and potential pivoting to other networked systems. The vendor has addressed this issue by removing the backdoor user in firmware BSP version 6.4.1 and later. However, no patches or updates are available for earlier versions, and no known exploits have been reported in the wild yet. The CVSS v3.1 score of 9.8 reflects the vulnerability's critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those relying on Wattsense Bridge devices for building automation, energy management, or critical infrastructure control. Exploitation can lead to unauthorized access to sensitive operational data, manipulation or disruption of building systems such as HVAC, lighting, or security controls, and potential denial of service. This could result in operational downtime, safety risks, and financial losses. Additionally, compromised devices could serve as entry points for lateral movement within corporate or industrial networks, increasing the risk of broader cyberattacks. Given the criticality of infrastructure in sectors like healthcare, manufacturing, and public services, the vulnerability poses a substantial threat to European organizations’ operational resilience and data security.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade all Wattsense Bridge devices to firmware version BSP 6.4.1 or later, where the hard-coded backdoor user has been removed. If upgrading is not immediately possible, physical security controls should be enhanced to restrict access to the serial interface, including locking device enclosures and monitoring access logs. Network segmentation should be implemented to isolate these devices from general IT networks, limiting exposure to potential attackers. Additionally, organizations should conduct regular audits to identify devices running vulnerable firmware versions and replace or update them accordingly. Employing intrusion detection systems that monitor for unusual access patterns on building automation networks can help detect exploitation attempts. Finally, coordinating with Wattsense for any available patches or security advisories and integrating these devices into the broader vulnerability management program is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-02-10T07:48:38.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e18c28fd46ded86987d

Added to database: 11/3/2025, 9:26:48 PM

Last enriched: 11/4/2025, 12:07:55 AM

Last updated: 12/20/2025, 5:17:15 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats