top of page
perceptive_background_267k.jpg

PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials vulnerability, allowing unauthenticated remote attackers to l…

Published:

19 januari 2026 om 23:00:00

Alert date:

20 januari 2026 om 11:15:47

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Mobile & IoT, Database & Storage

CVE-2026-1221 affects the PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS. The vulnerability involves the use of hard-coded credentials stored in the firmware. This allows unauthenticated remote attackers to log in to the database without proper authentication. The vulnerability poses a significant security risk as it provides unauthorized database access. Attackers can exploit this remotely without any authentication requirements. The hard-coded credentials are embedded in the device firmware, making them accessible to attackers who analyze the firmware. This type of vulnerability is particularly serious for network infrastructure devices.

Technical details

Mitigation steps:

Affected products:

BROWAN PrismX MX100 AP controller

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page