Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25072: CWE-330 Use of Insufficiently Random Values in Anhui Seeker Electronic Technology Co., LTD. XikeStor SKS8310-8X

0
High
VulnerabilityCVE-2026-25072cvecve-2026-25072cwe-330
Published: Sat Mar 07 2026 (03/07/2026, 00:20:05 UTC)
Source: CVE Database V5
Vendor/Project: Anhui Seeker Electronic Technology Co., LTD.
Product: XikeStor SKS8310-8X

Description

XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain a predictable session identifier vulnerability in the /goform/SetLogin endpoint that allows remote attackers to hijack authenticated sessions. Attackers can predict session identifiers using insufficiently random cookie values and exploit exposed session parameters in URLs to gain unauthorized access to authenticated user sessions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:34:01 UTC

Technical Analysis

CVE-2026-25072 identifies a critical security flaw in the firmware of the Anhui Seeker Electronic Technology Co., LTD. XikeStor SKS8310-8X network switch, specifically affecting firmware versions 1.04.B07 and prior. The vulnerability arises from the use of insufficiently random values in generating session identifiers for the /goform/SetLogin endpoint. This weakness allows remote attackers to predict session cookies due to poor entropy or predictable algorithms, violating CWE-330 standards. By exploiting predictable session identifiers and exposed session parameters in URLs, attackers can hijack authenticated sessions without needing prior authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its network attack vector, low attack complexity, no privileges required, and high impact on confidentiality and integrity. Although no exploits are currently known in the wild, the flaw exposes critical management interfaces to unauthorized access, risking control over network switch configurations and potentially broader network compromise. The vulnerability does not affect availability directly but compromises the integrity and confidentiality of the device's management sessions. The lack of available patches necessitates immediate attention to alternative mitigations.

Potential Impact

The primary impact of CVE-2026-25072 is unauthorized access to authenticated sessions on vulnerable XikeStor SKS8310-8X switches, enabling attackers to assume administrative control over network management interfaces. This can lead to unauthorized configuration changes, interception or manipulation of network traffic, and potential lateral movement within affected networks. Confidentiality is severely impacted as attackers can access sensitive management data. Integrity is compromised due to the possibility of unauthorized configuration changes. Although availability is not directly affected, the downstream effects of compromised network devices can disrupt network operations. Organizations relying on these switches for critical infrastructure or sensitive environments face elevated risks of espionage, sabotage, or data breaches. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in exposed network segments.

Mitigation Recommendations

1. Monitor vendor announcements closely and apply firmware updates promptly once patches addressing CVE-2026-25072 are released. 2. Until patches are available, restrict access to the management interfaces of XikeStor SKS8310-8X switches using network segmentation, firewalls, and access control lists to limit exposure to trusted administrators only. 3. Implement multi-factor authentication (MFA) on management interfaces if supported to add an additional layer of security beyond session identifiers. 4. Disable or restrict remote management access (e.g., via WAN or untrusted networks) to reduce attack surface. 5. Employ network intrusion detection/prevention systems (IDS/IPS) to detect anomalous session hijacking attempts or unusual access patterns. 6. Regularly audit and monitor logs for suspicious login activity or session anomalies. 7. Consider deploying compensating controls such as VPNs or jump hosts for management access to enhance security. 8. Educate administrators on the risks of session hijacking and the importance of secure session management practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-28T21:47:35.120Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab78cec48b3f10ff0845b4

Added to database: 3/7/2026, 1:01:02 AM

Last enriched: 3/14/2026, 7:34:01 PM

Last updated: 4/20/2026, 1:00:45 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses