CVE-2026-1223: CWE-522 Insufficiently Protected Credentials in BROWAN COMMUNICATIONS PrismX MX100 AP controller
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Insufficiently Protected Credentials vulnerability, allowing privileged remote attackers to allowing authenticated remote attackers to obtain SMTP plaintext passwords through the web frontend.
AI Analysis
Technical Summary
CVE-2026-1223 identifies a vulnerability in the PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS, categorized under CWE-522 for insufficiently protected credentials. The flaw allows remote attackers who have already authenticated with high privileges to extract SMTP plaintext passwords through the device's web frontend interface. This vulnerability arises because the controller does not adequately safeguard stored or transmitted SMTP credentials, exposing them in cleartext to authorized users. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require user interaction (UI:N). However, it requires privileged remote authentication (PR:H), meaning the attacker must have elevated access to the device's management interface. The impact primarily affects confidentiality (VC:H) by disclosing sensitive SMTP credentials, which could be leveraged to intercept or manipulate email communications or pivot within the network. Integrity and availability impacts are not indicated. The vulnerability has a CVSS v4.0 base score of 6.9, reflecting medium severity. No public exploits or patches are currently available, increasing the importance of proactive mitigation. The affected product is used in wireless network management, and compromised SMTP credentials could facilitate further attacks such as phishing or data exfiltration. The vulnerability was published on January 20, 2026, and assigned by TW-CERT. The lack of patches necessitates immediate risk management strategies.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality of SMTP credentials managed via the PrismX MX100 AP controller. Exposure of these credentials can lead to unauthorized access to email systems, enabling attackers to intercept sensitive communications, conduct phishing campaigns, or move laterally within the network. Organizations relying on this controller for wireless access point management and integrated SMTP services may face increased risk of data breaches. The requirement for privileged authentication limits the threat to insiders or attackers who have already compromised credentials, but the impact remains significant in environments with weak access controls. Critical infrastructure, government agencies, and enterprises with high reliance on secure email communications are particularly vulnerable. The absence of patches means organizations must rely on compensating controls to mitigate risk. Additionally, disclosure of plaintext SMTP passwords can undermine trust in communication channels and potentially violate data protection regulations such as GDPR if personal data is exposed.
Mitigation Recommendations
1. Restrict access to the PrismX MX100 AP controller's web frontend to trusted administrative networks using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms and limit privileged account usage to reduce the risk of credential compromise. 3. Regularly audit and monitor access logs for unusual or unauthorized access attempts to the device management interface. 4. Avoid storing SMTP credentials in the controller where possible; use alternative secure methods for email relay authentication. 5. Implement multi-factor authentication (MFA) for administrative access to the device to add an additional security layer. 6. Once available, promptly apply vendor patches or firmware updates addressing this vulnerability. 7. Educate administrators on the risks of credential exposure and enforce strict password management policies. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect anomalous activities related to SMTP credential access. 9. Isolate critical network segments to limit the impact of potential credential compromise. 10. Coordinate with BROWAN COMMUNICATIONS support channels for updates and guidance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2026-1223: CWE-522 Insufficiently Protected Credentials in BROWAN COMMUNICATIONS PrismX MX100 AP controller
Description
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Insufficiently Protected Credentials vulnerability, allowing privileged remote attackers to allowing authenticated remote attackers to obtain SMTP plaintext passwords through the web frontend.
AI-Powered Analysis
Technical Analysis
CVE-2026-1223 identifies a vulnerability in the PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS, categorized under CWE-522 for insufficiently protected credentials. The flaw allows remote attackers who have already authenticated with high privileges to extract SMTP plaintext passwords through the device's web frontend interface. This vulnerability arises because the controller does not adequately safeguard stored or transmitted SMTP credentials, exposing them in cleartext to authorized users. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require user interaction (UI:N). However, it requires privileged remote authentication (PR:H), meaning the attacker must have elevated access to the device's management interface. The impact primarily affects confidentiality (VC:H) by disclosing sensitive SMTP credentials, which could be leveraged to intercept or manipulate email communications or pivot within the network. Integrity and availability impacts are not indicated. The vulnerability has a CVSS v4.0 base score of 6.9, reflecting medium severity. No public exploits or patches are currently available, increasing the importance of proactive mitigation. The affected product is used in wireless network management, and compromised SMTP credentials could facilitate further attacks such as phishing or data exfiltration. The vulnerability was published on January 20, 2026, and assigned by TW-CERT. The lack of patches necessitates immediate risk management strategies.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality of SMTP credentials managed via the PrismX MX100 AP controller. Exposure of these credentials can lead to unauthorized access to email systems, enabling attackers to intercept sensitive communications, conduct phishing campaigns, or move laterally within the network. Organizations relying on this controller for wireless access point management and integrated SMTP services may face increased risk of data breaches. The requirement for privileged authentication limits the threat to insiders or attackers who have already compromised credentials, but the impact remains significant in environments with weak access controls. Critical infrastructure, government agencies, and enterprises with high reliance on secure email communications are particularly vulnerable. The absence of patches means organizations must rely on compensating controls to mitigate risk. Additionally, disclosure of plaintext SMTP passwords can undermine trust in communication channels and potentially violate data protection regulations such as GDPR if personal data is exposed.
Mitigation Recommendations
1. Restrict access to the PrismX MX100 AP controller's web frontend to trusted administrative networks using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms and limit privileged account usage to reduce the risk of credential compromise. 3. Regularly audit and monitor access logs for unusual or unauthorized access attempts to the device management interface. 4. Avoid storing SMTP credentials in the controller where possible; use alternative secure methods for email relay authentication. 5. Implement multi-factor authentication (MFA) for administrative access to the device to add an additional security layer. 6. Once available, promptly apply vendor patches or firmware updates addressing this vulnerability. 7. Educate administrators on the risks of credential exposure and enforce strict password management policies. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect anomalous activities related to SMTP credential access. 9. Isolate critical network segments to limit the impact of potential credential compromise. 10. Coordinate with BROWAN COMMUNICATIONS support channels for updates and guidance.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- twcert
- Date Reserved
- 2026-01-20T05:44:57.775Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696f25d04623b1157c1cfd10
Added to database: 1/20/2026, 6:50:56 AM
Last enriched: 1/20/2026, 7:05:44 AM
Last updated: 1/20/2026, 3:43:49 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67824: n/a
UnknownCVE-2025-65482: n/a
UnknownCVE-2025-36397: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Application Gateway
MediumCVE-2025-36396: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in IBM Application Gateway
MediumCVE-2025-36115: CWE-384 Session Fixation in IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.