BlackKite: Home
Menu

PUBLISHED DATE: May 21, 2025CVE-2025-48413:
The `/etc/passwd` and `/etc/shadow`...

CVSS:
7.7
EPSS:
1.90%
Exploitability:
2.5
In KEV:
No
Description

The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).

Questions to Ask Vendors
  1. Can you confirm whether your systems are affected by CVE-2025-48413, and if so, what steps are you currently taking to mitigate this vulnerability?
  2. What is your estimated timeline for fully resolving CVE-2025-48413 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
References

Ready to get results you can trust?