Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Belden
Belden hirschmann Hios Belden hirschmann Hisecos |
|
| Vendors & Products |
Belden
Belden hirschmann Hios Belden hirschmann Hisecos |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials. | |
| Title | Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:06:32.230Z
Reserved: 2026-04-03T17:10:57.779Z
Link: CVE-2018-25236
Updated: 2026-04-06T15:03:15.192Z
Status : Awaiting Analysis
Published: 2026-04-03T23:17:00.823
Modified: 2026-04-07T13:20:55.200
Link: CVE-2018-25236
No data.
OpenCVE Enrichment
Updated: 2026-04-06T22:21:38Z