CVE-2025-35042: CWE-1392 Use of Default Credentials in Airship AI Acropolis
Airship AI Acropolis includes a default administrative account that uses the same credentials on every installation. Instances of Airship AI that do not change this account password are vulnerable to a remote attacker logging in and gaining the privileges of this account. Fixed in 10.2.35, 11.0.21, and 11.1.9.
AI Analysis
Technical Summary
CVE-2025-35042 is a critical vulnerability identified in the Airship AI Acropolis platform, caused by the use of default administrative credentials that are identical across all installations. This vulnerability stems from CWE-1392, which refers to the use of default or hardcoded credentials. Specifically, the product includes a default administrative account with a preset username and password that is not unique per deployment. If administrators fail to change these default credentials, remote attackers can exploit this weakness to gain unauthorized administrative access without requiring any authentication, user interaction, or prior privileges. The vulnerability allows attackers to fully compromise the affected system, potentially leading to complete control over the Airship AI Acropolis instance. The CVSS 4.0 score of 9.3 reflects the critical nature of this flaw, highlighting its ease of exploitation (network attack vector, no authentication or user interaction needed) and the high impact on confidentiality, integrity, and availability. The issue has been addressed in versions 10.2.35, 11.0.21, and 11.1.9, indicating that earlier versions remain vulnerable. No known exploits are currently reported in the wild, but the simplicity of exploitation and the severity of impact make this a high-risk vulnerability requiring immediate attention. The vulnerability affects all versions prior to the fixed releases, and the lack of unique credentials per installation represents a significant security oversight in the product's deployment model.
Potential Impact
For European organizations using Airship AI Acropolis, this vulnerability poses a severe risk. Unauthorized administrative access can lead to full system compromise, including data theft, manipulation, or destruction, disruption of AI-driven operations, and potential lateral movement within the network. Given that Airship AI Acropolis may be used in critical AI infrastructure or data processing environments, exploitation could undermine business continuity, intellectual property security, and regulatory compliance (e.g., GDPR). The ability for remote attackers to gain privileged access without authentication increases the risk of widespread attacks, especially in sectors relying heavily on AI technologies such as finance, manufacturing, healthcare, and government agencies. The vulnerability could also be leveraged for espionage or sabotage, particularly in organizations involved in sensitive or strategic AI research and development. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability’s characteristics make it an attractive target for attackers seeking to exploit default credentials.
Mitigation Recommendations
European organizations should immediately verify whether their Airship AI Acropolis deployments are running vulnerable versions prior to 10.2.35, 11.0.21, or 11.1.9. The primary mitigation is to upgrade to one of the fixed versions as soon as possible. Until upgrades are applied, organizations must change the default administrative credentials to strong, unique passwords to prevent unauthorized access. Network-level controls should be implemented to restrict access to the management interfaces of Airship AI Acropolis instances, ideally limiting connections to trusted IP addresses or VPNs. Monitoring and logging should be enhanced to detect any unauthorized login attempts or suspicious activities related to administrative accounts. Additionally, organizations should conduct thorough audits of user accounts and permissions within the platform to ensure no default or weak credentials remain. Implementing multi-factor authentication (MFA) for administrative access, if supported by the product, would further reduce risk. Finally, organizations should review and update their incident response plans to include scenarios involving compromise of AI infrastructure components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-35042: CWE-1392 Use of Default Credentials in Airship AI Acropolis
Description
Airship AI Acropolis includes a default administrative account that uses the same credentials on every installation. Instances of Airship AI that do not change this account password are vulnerable to a remote attacker logging in and gaining the privileges of this account. Fixed in 10.2.35, 11.0.21, and 11.1.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-35042 is a critical vulnerability identified in the Airship AI Acropolis platform, caused by the use of default administrative credentials that are identical across all installations. This vulnerability stems from CWE-1392, which refers to the use of default or hardcoded credentials. Specifically, the product includes a default administrative account with a preset username and password that is not unique per deployment. If administrators fail to change these default credentials, remote attackers can exploit this weakness to gain unauthorized administrative access without requiring any authentication, user interaction, or prior privileges. The vulnerability allows attackers to fully compromise the affected system, potentially leading to complete control over the Airship AI Acropolis instance. The CVSS 4.0 score of 9.3 reflects the critical nature of this flaw, highlighting its ease of exploitation (network attack vector, no authentication or user interaction needed) and the high impact on confidentiality, integrity, and availability. The issue has been addressed in versions 10.2.35, 11.0.21, and 11.1.9, indicating that earlier versions remain vulnerable. No known exploits are currently reported in the wild, but the simplicity of exploitation and the severity of impact make this a high-risk vulnerability requiring immediate attention. The vulnerability affects all versions prior to the fixed releases, and the lack of unique credentials per installation represents a significant security oversight in the product's deployment model.
Potential Impact
For European organizations using Airship AI Acropolis, this vulnerability poses a severe risk. Unauthorized administrative access can lead to full system compromise, including data theft, manipulation, or destruction, disruption of AI-driven operations, and potential lateral movement within the network. Given that Airship AI Acropolis may be used in critical AI infrastructure or data processing environments, exploitation could undermine business continuity, intellectual property security, and regulatory compliance (e.g., GDPR). The ability for remote attackers to gain privileged access without authentication increases the risk of widespread attacks, especially in sectors relying heavily on AI technologies such as finance, manufacturing, healthcare, and government agencies. The vulnerability could also be leveraged for espionage or sabotage, particularly in organizations involved in sensitive or strategic AI research and development. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability’s characteristics make it an attractive target for attackers seeking to exploit default credentials.
Mitigation Recommendations
European organizations should immediately verify whether their Airship AI Acropolis deployments are running vulnerable versions prior to 10.2.35, 11.0.21, or 11.1.9. The primary mitigation is to upgrade to one of the fixed versions as soon as possible. Until upgrades are applied, organizations must change the default administrative credentials to strong, unique passwords to prevent unauthorized access. Network-level controls should be implemented to restrict access to the management interfaces of Airship AI Acropolis instances, ideally limiting connections to trusted IP addresses or VPNs. Monitoring and logging should be enhanced to detect any unauthorized login attempts or suspicious activities related to administrative accounts. Additionally, organizations should conduct thorough audits of user accounts and permissions within the platform to ensure no default or weak credentials remain. Implementing multi-factor authentication (MFA) for administrative access, if supported by the product, would further reduce risk. Finally, organizations should review and update their incident response plans to include scenarios involving compromise of AI infrastructure components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.405Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d1e592efb46fd03052629a
Added to database: 9/23/2025, 12:10:58 AM
Last enriched: 10/1/2025, 12:15:56 AM
Last updated: 11/7/2025, 2:57:15 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12856: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-12855: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-12857: SQL Injection in code-projects Responsive Hotel Site
MediumOllama, Nvidia Flaws Put AI Infrastructure at Risk
CriticalCVE-2023-4132: Use After Free in Red Hat Red Hat Enterprise Linux 8
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.