CVE-2025-5124

HIGH

Sony SNC-* - Default Credentials

Title source: llm
STIX 2.1

Description

A vulnerability classified as critical has been found in Sony SNC-M1, SNC-M3, SNC-RZ25N, SNC-RZ30N, SNC-DS10, SNC-CS3N and SNC-RX570N up to 1.30. This affects an unknown part of the component Administrative Interface. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. It is recommended to change the configuration settings. The vendor was contacted early about this issue. They confirmed the existence but pointed out that they "have published the 'Hardening Guide' on the Web from July 2018 to January 2025 and have thoroughly informed customers of the recommendation to change their initial passwords".

Scores

CVSS v3 8.1
EPSS 0.0058
EPSS Percentile 68.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-1392
Status published
Products (50)
Sony/SNC-CS3N 1.0
Sony/SNC-CS3N 1.1
Sony/SNC-CS3N 1.10
Sony/SNC-CS3N 1.11
Sony/SNC-CS3N 1.12
Sony/SNC-CS3N 1.13
Sony/SNC-CS3N 1.14
Sony/SNC-CS3N 1.15
Sony/SNC-CS3N 1.16
Sony/SNC-CS3N 1.17
... and 40 more
Published May 24, 2025
Tracked Since Feb 18, 2026