CVE-2025-57175: CWE-259 Use of Hard-coded Password in Siklu EtherHaul 8010
Siklu EtherHaul 8010 siklu-uimage-nxp-enc-10_6_2-18707-ea552dc00b devices have a static root password.
AI Analysis
Technical Summary
The Siklu EtherHaul 8010 device firmware version siklu-uimage-nxp-enc-10_6_2-18707-ea552dc00b contains a hard-coded static root password, classified under CWE-259. This vulnerability allows an attacker with network access to the device to potentially gain unauthorized root-level access. The CVSS v3.1 base score is 6.4, reflecting a medium severity with attack vector requiring physical or local access (AV:P), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). There is no vendor advisory or patch information available, and the device is not a cloud service, so remediation depends on vendor updates or configuration changes.
Potential Impact
The vulnerability allows unauthorized root access due to a hard-coded password, potentially leading to full compromise of the affected device's confidentiality, integrity, and availability. This can disrupt network operations relying on the EtherHaul 8010 device. However, the attack vector is physical or local network access with high complexity, limiting remote exploitation likelihood. No known exploits have been reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict physical and network access to affected devices to trusted personnel only. Change default credentials if possible and monitor for any unusual access attempts. Follow Siklu's official communications for updates on patches or mitigations.
CVE-2025-57175: CWE-259 Use of Hard-coded Password in Siklu EtherHaul 8010
Description
Siklu EtherHaul 8010 siklu-uimage-nxp-enc-10_6_2-18707-ea552dc00b devices have a static root password.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Siklu EtherHaul 8010 device firmware version siklu-uimage-nxp-enc-10_6_2-18707-ea552dc00b contains a hard-coded static root password, classified under CWE-259. This vulnerability allows an attacker with network access to the device to potentially gain unauthorized root-level access. The CVSS v3.1 base score is 6.4, reflecting a medium severity with attack vector requiring physical or local access (AV:P), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). There is no vendor advisory or patch information available, and the device is not a cloud service, so remediation depends on vendor updates or configuration changes.
Potential Impact
The vulnerability allows unauthorized root access due to a hard-coded password, potentially leading to full compromise of the affected device's confidentiality, integrity, and availability. This can disrupt network operations relying on the EtherHaul 8010 device. However, the attack vector is physical or local network access with high complexity, limiting remote exploitation likelihood. No known exploits have been reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict physical and network access to affected devices to trusted personnel only. Change default credentials if possible and monitor for any unusual access attempts. Follow Siklu's official communications for updates on patches or mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d737031cc7ad14da4194c3
Added to database: 4/9/2026, 5:20:03 AM
Last enriched: 4/9/2026, 5:25:46 AM
Last updated: 4/10/2026, 7:33:45 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.