Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35042: CWE-1392 Use of Default Credentials in Airship AI Acropolis

0
Critical
VulnerabilityCVE-2025-35042cvecve-2025-35042cwe-1392
Published: Mon Sep 22 2025 (09/22/2025, 15:57:03 UTC)
Source: CVE Database V5
Vendor/Project: Airship AI
Product: Acropolis

Description

Airship AI Acropolis includes a default administrative account that uses the same credentials on every installation. Instances of Airship AI that do not change this account password are vulnerable to a remote attacker logging in and gaining the privileges of this account. Fixed in 10.2.35, 11.0.21, and 11.1.9.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:15:56 UTC

Technical Analysis

CVE-2025-35042 is a critical vulnerability identified in the Airship AI Acropolis platform, caused by the use of default administrative credentials that are identical across all installations. This vulnerability stems from CWE-1392, which refers to the use of default or hardcoded credentials. Specifically, the product includes a default administrative account with a preset username and password that is not unique per deployment. If administrators fail to change these default credentials, remote attackers can exploit this weakness to gain unauthorized administrative access without requiring any authentication, user interaction, or prior privileges. The vulnerability allows attackers to fully compromise the affected system, potentially leading to complete control over the Airship AI Acropolis instance. The CVSS 4.0 score of 9.3 reflects the critical nature of this flaw, highlighting its ease of exploitation (network attack vector, no authentication or user interaction needed) and the high impact on confidentiality, integrity, and availability. The issue has been addressed in versions 10.2.35, 11.0.21, and 11.1.9, indicating that earlier versions remain vulnerable. No known exploits are currently reported in the wild, but the simplicity of exploitation and the severity of impact make this a high-risk vulnerability requiring immediate attention. The vulnerability affects all versions prior to the fixed releases, and the lack of unique credentials per installation represents a significant security oversight in the product's deployment model.

Potential Impact

For European organizations using Airship AI Acropolis, this vulnerability poses a severe risk. Unauthorized administrative access can lead to full system compromise, including data theft, manipulation, or destruction, disruption of AI-driven operations, and potential lateral movement within the network. Given that Airship AI Acropolis may be used in critical AI infrastructure or data processing environments, exploitation could undermine business continuity, intellectual property security, and regulatory compliance (e.g., GDPR). The ability for remote attackers to gain privileged access without authentication increases the risk of widespread attacks, especially in sectors relying heavily on AI technologies such as finance, manufacturing, healthcare, and government agencies. The vulnerability could also be leveraged for espionage or sabotage, particularly in organizations involved in sensitive or strategic AI research and development. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability’s characteristics make it an attractive target for attackers seeking to exploit default credentials.

Mitigation Recommendations

European organizations should immediately verify whether their Airship AI Acropolis deployments are running vulnerable versions prior to 10.2.35, 11.0.21, or 11.1.9. The primary mitigation is to upgrade to one of the fixed versions as soon as possible. Until upgrades are applied, organizations must change the default administrative credentials to strong, unique passwords to prevent unauthorized access. Network-level controls should be implemented to restrict access to the management interfaces of Airship AI Acropolis instances, ideally limiting connections to trusted IP addresses or VPNs. Monitoring and logging should be enhanced to detect any unauthorized login attempts or suspicious activities related to administrative accounts. Additionally, organizations should conduct thorough audits of user accounts and permissions within the platform to ensure no default or weak credentials remain. Implementing multi-factor authentication (MFA) for administrative access, if supported by the product, would further reduce risk. Finally, organizations should review and update their incident response plans to include scenarios involving compromise of AI infrastructure components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.405Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d1e592efb46fd03052629a

Added to database: 9/23/2025, 12:10:58 AM

Last enriched: 10/1/2025, 12:15:56 AM

Last updated: 11/7/2025, 2:57:15 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats