Burk Technology ARC Solo's password change mechanism can be utilized without proper
authentication procedures, allowing an attacker to take over the device.
A password change request can be sent directly to the device's HTTP
endpoint without providing valid credentials. The system does not
enforce proper authentication or session validation, allowing the
password change to proceed without verifying the request's legitimacy.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Burk
Burk arc Solo |
|
Vendors & Products |
Burk
Burk arc Solo |
Fri, 08 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 08 Aug 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Burk Technology ARC Solo's password change mechanism can be utilized without proper authentication procedures, allowing an attacker to take over the device. A password change request can be sent directly to the device's HTTP endpoint without providing valid credentials. The system does not enforce proper authentication or session validation, allowing the password change to proceed without verifying the request's legitimacy. | |
Title | Burk Technology ARC Solo Missing Authentication for Critical Function | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-08T18:55:32.283Z
Reserved: 2025-05-22T17:59:44.733Z
Link: CVE-2025-5095

Updated: 2025-08-08T18:55:29.133Z

Status : Awaiting Analysis
Published: 2025-08-08T18:15:28.860
Modified: 2025-08-08T20:30:18.180
Link: CVE-2025-5095

No data.