Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1221: CWE-798 Use of Hard-coded Credentials in BROWAN COMMUNICATIONS PrismX MX100 AP controller

0
Critical
VulnerabilityCVE-2026-1221cvecve-2026-1221cwe-798
Published: Tue Jan 20 2026 (01/20/2026, 06:25:46 UTC)
Source: CVE Database V5
Vendor/Project: BROWAN COMMUNICATIONS
Product: PrismX MX100 AP controller

Description

CVE-2026-1221 is a critical vulnerability in the BROWAN COMMUNICATIONS PrismX MX100 AP controller caused by the use of hard-coded database credentials embedded in the firmware. This flaw allows unauthenticated remote attackers to log into the device's database without any user interaction or privileges, potentially leading to full compromise of the device. The vulnerability has a CVSS 4. 0 score of 9. 3, reflecting its high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and critical severity make it a significant threat. European organizations using PrismX MX100 controllers in their network infrastructure could face risks including data breaches, unauthorized network access, and disruption of wireless services. Mitigation requires immediate firmware updates from the vendor or, if unavailable, network segmentation and strict access controls to isolate vulnerable devices. Countries with higher adoption of BROWAN COMMUNICATIONS products and critical infrastructure relying on wireless AP controllers are at greater risk. Given the critical nature and remote unauthenticated access, this vulnerability demands urgent attention from defenders.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:22:56 UTC

Technical Analysis

CVE-2026-1221 identifies a critical security vulnerability in the PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS. The root cause is the presence of hard-coded credentials within the device firmware, specifically for the database login. These credentials are embedded in the firmware and cannot be changed by the user, allowing any remote attacker to authenticate to the database without prior authorization or user interaction. This vulnerability is categorized under CWE-798 (Use of Hard-coded Credentials), a well-known weakness that often leads to unauthorized access and control over affected systems. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N) with no required privileges (PR:N), no user interaction (UI:N), and no scope change (S:U). The impact metrics are high for confidentiality, integrity, and availability, meaning an attacker could exfiltrate sensitive data, modify configurations, or disrupt device operations. The affected product, PrismX MX100, is an AP controller used to manage wireless access points, making it a critical component in enterprise and industrial network environments. No patches or firmware updates are currently available, and no exploits have been observed in the wild, but the vulnerability’s nature makes it highly exploitable. Attackers gaining database access could manipulate wireless network configurations, intercept or redirect traffic, or pivot to other internal systems, posing significant risks to network security and operational continuity.

Potential Impact

For European organizations, the impact of CVE-2026-1221 can be severe. Compromise of the PrismX MX100 AP controller could lead to unauthorized access to wireless network management, enabling attackers to intercept sensitive communications or disrupt wireless connectivity. This could affect enterprises, public institutions, and critical infrastructure sectors relying on secure and stable wireless networks. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow attackers to alter network configurations or inject malicious payloads. Availability impacts could result in denial of wireless services, affecting business operations and user productivity. The vulnerability’s remote and unauthenticated exploitability increases the risk of widespread attacks, especially in environments where these devices are accessible from less secure network segments or exposed to the internet. Additionally, the lack of available patches complicates remediation efforts, potentially prolonging exposure. European organizations with regulatory obligations around data protection (e.g., GDPR) could face compliance risks if breaches occur due to this vulnerability.

Mitigation Recommendations

1. Immediate network segmentation: Isolate PrismX MX100 AP controllers from untrusted networks and restrict access to management interfaces to trusted administrators only. 2. Implement strict firewall rules to block unauthorized inbound traffic targeting the AP controller’s management and database ports. 3. Monitor network traffic for unusual access patterns or attempts to connect to the device’s database service. 4. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect exploitation attempts related to hard-coded credential usage. 5. Engage with BROWAN COMMUNICATIONS for firmware updates or patches; if unavailable, request vendor guidance or consider device replacement. 6. Use multi-factor authentication and strong access controls on network segments hosting these devices to reduce lateral movement risk. 7. Conduct regular security audits and vulnerability assessments focusing on wireless infrastructure components. 8. Maintain up-to-date asset inventories to quickly identify and respond to affected devices. 9. Educate network administrators about the risks of hard-coded credentials and the importance of securing wireless management systems. 10. Consider deploying compensating controls such as VPN tunnels or encrypted management channels to protect communications with the AP controller.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2026-01-20T05:44:54.980Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f25d04623b1157c1cfd08

Added to database: 1/20/2026, 6:50:56 AM

Last enriched: 1/27/2026, 8:22:56 PM

Last updated: 2/7/2026, 6:54:47 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats