CVE-2025-35041: CWE-307 Improper Restriction of Excessive Authentication Attempts in Airship AI Acropolis
Airship AI Acropolis allows unlimited MFA attempts for 15 minutes after a user has logged in with valid credentials. A remote attacker with valid credentials could brute-force the 6-digit MFA code. Fixed in 10.2.35, 11.0.21, and 11.1.9.
AI Analysis
Technical Summary
CVE-2025-35041 is a high-severity vulnerability identified in Airship AI's Acropolis product, classified under CWE-307: Improper Restriction of Excessive Authentication Attempts. The vulnerability arises because the system allows unlimited Multi-Factor Authentication (MFA) attempts for a 15-minute window after a user has successfully logged in with valid credentials. Specifically, an attacker who has obtained valid user credentials can remotely brute-force the 6-digit MFA code without any throttling or lockout mechanisms during this period. This flaw effectively undermines the security benefits of MFA by enabling attackers to bypass the second authentication factor through repeated guessing attempts. The vulnerability affects versions prior to the fixed releases 10.2.35, 11.0.21, and 11.1.9. The CVSS v3.1 score of 7.5 reflects the high impact on confidentiality, integrity, and availability, with the attack vector being network-based and requiring low privileges but no user interaction. The vulnerability's exploitation could lead to unauthorized account access, data breaches, and potential lateral movement within affected environments. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant risk once weaponized.
Potential Impact
For European organizations, the impact of CVE-2025-35041 can be substantial, especially for those relying on Airship AI Acropolis for critical infrastructure, data management, or operational technology. Successful exploitation allows attackers to bypass MFA protections, potentially leading to unauthorized access to sensitive systems and data. This can result in data theft, disruption of services, and compromise of integrity and availability of critical business operations. Given the increasing regulatory focus in Europe on data protection (e.g., GDPR), such breaches could also lead to severe legal and financial penalties. Additionally, sectors such as finance, healthcare, and government agencies, which often deploy strong MFA mechanisms, may find their security posture weakened, increasing the risk of espionage, fraud, or sabotage. The 15-minute window of unlimited MFA attempts is particularly dangerous in automated attack scenarios, increasing the likelihood of successful brute-force attacks.
Mitigation Recommendations
Organizations using Airship AI Acropolis should immediately verify their product version and apply the patches released in versions 10.2.35, 11.0.21, or 11.1.9. Beyond patching, it is critical to implement additional security controls: 1) Enforce rate limiting or lockout policies on MFA attempts to prevent brute-force attacks, ideally reducing the window of unlimited attempts to zero. 2) Monitor authentication logs for unusual patterns, such as rapid successive MFA failures following successful credential logins. 3) Employ anomaly detection systems that can flag suspicious login behaviors, especially from unusual IP addresses or geolocations. 4) Consider integrating adaptive MFA mechanisms that increase authentication requirements based on risk factors. 5) Educate users about credential security to reduce the risk of credential compromise, which is a prerequisite for exploiting this vulnerability. 6) Network segmentation and zero-trust principles can limit the impact of compromised accounts. 7) Conduct regular penetration testing and vulnerability assessments focusing on authentication mechanisms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-35041: CWE-307 Improper Restriction of Excessive Authentication Attempts in Airship AI Acropolis
Description
Airship AI Acropolis allows unlimited MFA attempts for 15 minutes after a user has logged in with valid credentials. A remote attacker with valid credentials could brute-force the 6-digit MFA code. Fixed in 10.2.35, 11.0.21, and 11.1.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-35041 is a high-severity vulnerability identified in Airship AI's Acropolis product, classified under CWE-307: Improper Restriction of Excessive Authentication Attempts. The vulnerability arises because the system allows unlimited Multi-Factor Authentication (MFA) attempts for a 15-minute window after a user has successfully logged in with valid credentials. Specifically, an attacker who has obtained valid user credentials can remotely brute-force the 6-digit MFA code without any throttling or lockout mechanisms during this period. This flaw effectively undermines the security benefits of MFA by enabling attackers to bypass the second authentication factor through repeated guessing attempts. The vulnerability affects versions prior to the fixed releases 10.2.35, 11.0.21, and 11.1.9. The CVSS v3.1 score of 7.5 reflects the high impact on confidentiality, integrity, and availability, with the attack vector being network-based and requiring low privileges but no user interaction. The vulnerability's exploitation could lead to unauthorized account access, data breaches, and potential lateral movement within affected environments. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant risk once weaponized.
Potential Impact
For European organizations, the impact of CVE-2025-35041 can be substantial, especially for those relying on Airship AI Acropolis for critical infrastructure, data management, or operational technology. Successful exploitation allows attackers to bypass MFA protections, potentially leading to unauthorized access to sensitive systems and data. This can result in data theft, disruption of services, and compromise of integrity and availability of critical business operations. Given the increasing regulatory focus in Europe on data protection (e.g., GDPR), such breaches could also lead to severe legal and financial penalties. Additionally, sectors such as finance, healthcare, and government agencies, which often deploy strong MFA mechanisms, may find their security posture weakened, increasing the risk of espionage, fraud, or sabotage. The 15-minute window of unlimited MFA attempts is particularly dangerous in automated attack scenarios, increasing the likelihood of successful brute-force attacks.
Mitigation Recommendations
Organizations using Airship AI Acropolis should immediately verify their product version and apply the patches released in versions 10.2.35, 11.0.21, or 11.1.9. Beyond patching, it is critical to implement additional security controls: 1) Enforce rate limiting or lockout policies on MFA attempts to prevent brute-force attacks, ideally reducing the window of unlimited attempts to zero. 2) Monitor authentication logs for unusual patterns, such as rapid successive MFA failures following successful credential logins. 3) Employ anomaly detection systems that can flag suspicious login behaviors, especially from unusual IP addresses or geolocations. 4) Consider integrating adaptive MFA mechanisms that increase authentication requirements based on risk factors. 5) Educate users about credential security to reduce the risk of credential compromise, which is a prerequisite for exploiting this vulnerability. 6) Network segmentation and zero-trust principles can limit the impact of compromised accounts. 7) Conduct regular penetration testing and vulnerability assessments focusing on authentication mechanisms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.405Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d1e592efb46fd030526296
Added to database: 9/23/2025, 12:10:58 AM
Last enriched: 10/1/2025, 12:16:13 AM
Last updated: 11/14/2025, 11:13:23 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10686: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Creta Testimonial Showcase
UnknownCVE-2025-64444: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Sony Network Communications Inc. NCP-HG100/Cellular model
HighCVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.