Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66237: CWE-798 Use of Hard-coded Credentials in Sunbird DCIM dcTrack

0
High
VulnerabilityCVE-2025-66237cvecve-2025-66237cwe-798
Published: Thu Dec 04 2025 (12/04/2025, 21:02:59 UTC)
Source: CVE Database V5
Vendor/Project: Sunbird
Product: DCIM dcTrack

Description

DCIM dcTrack platforms utilize default and hard-coded credentials for access. An attacker could use these credentials to administer the database, escalate privileges on the platform or execute system commands on the host.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:10:15 UTC

Technical Analysis

CVE-2025-66237 is a vulnerability identified in Sunbird's DCIM dcTrack platform, which is used for data center infrastructure management. The root cause is the presence of hard-coded credentials embedded within the software, classified under CWE-798. These credentials are default and cannot be changed easily, allowing an attacker who gains local access to the system to authenticate using these credentials. Once authenticated, the attacker can administer the underlying database, escalate their privileges on the platform, and execute arbitrary system commands on the host machine. The CVSS 4.0 vector indicates that the attack requires local access (AV:L) and low attack complexity (AC:L), but no user interaction (UI:N) is needed. Privileges are required but only at a high level (PR:H), meaning the attacker must already have some elevated access, but not necessarily full administrative rights. The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), indicating that exploitation could lead to full system compromise. No known exploits are currently in the wild, but the vulnerability is publicly disclosed and rated with a high severity score of 8.4. The affected versions are not explicitly detailed beyond '0', suggesting this may apply to initial or all versions of the product. The lack of available patches at the time of publication increases the urgency for organizations to apply compensating controls. The vulnerability is particularly critical because DCIM platforms like dcTrack manage essential data center resources, and compromise could lead to operational disruptions or data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-66237 is significant due to the critical role DCIM platforms play in managing data center infrastructure, including power, cooling, and network resources. Exploitation could allow attackers to gain unauthorized administrative access, leading to data exfiltration, manipulation of infrastructure configurations, or disruption of services. This could result in downtime, financial losses, and damage to reputation. Organizations in sectors such as finance, telecommunications, healthcare, and government, which rely heavily on data center availability and integrity, are particularly vulnerable. Additionally, the ability to execute system commands on the host could facilitate lateral movement within networks, increasing the risk of broader compromise. Given the high CVSS score and the critical nature of the affected systems, the vulnerability poses a substantial threat to operational continuity and data security in European enterprises.

Mitigation Recommendations

1. Immediately identify and inventory all instances of Sunbird DCIM dcTrack within the organization. 2. Change all default or hard-coded credentials to strong, unique passwords where possible. If the software does not allow changing these credentials, implement network segmentation and strict access controls to limit local access to trusted administrators only. 3. Employ host-based intrusion detection systems (HIDS) and continuous monitoring to detect unusual administrative or command execution activities on affected hosts. 4. Restrict physical and remote access to systems running dcTrack to minimize the risk of attackers gaining the required local access. 5. Engage with Sunbird for updates or patches addressing this vulnerability and apply them promptly once available. 6. Conduct regular security audits and penetration tests focusing on authentication mechanisms and privilege escalation paths within DCIM environments. 7. Implement multi-factor authentication (MFA) for administrative access where supported to add an additional security layer. 8. Maintain comprehensive logging and review logs regularly to detect potential exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-25T17:32:15.110Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931f91e0459f550ecfdf6c5

Added to database: 12/4/2025, 9:11:58 PM

Last enriched: 12/11/2025, 10:10:15 PM

Last updated: 1/19/2026, 10:22:51 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats