By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and control functions.
History

Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Packet Power
Packet Power eg
Packet Power emx
Vendors & Products Packet Power
Packet Power eg
Packet Power emx

Fri, 08 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 Aug 2025 16:45:00 +0000

Type Values Removed Values Added
Description By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and control functions.
Title Packet Power EMX and EG Missing Authentication for Critical Function
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-08-08T19:14:38.595Z

Reserved: 2025-07-28T14:22:48.148Z

Link: CVE-2025-8284

cve-icon Vulnrichment

Updated: 2025-08-08T19:14:34.368Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-08T17:15:30.010

Modified: 2025-08-08T20:30:18.180

Link: CVE-2025-8284

cve-icon Redhat

No data.