CVE-2025-46352

9.8 CRITICAL

📋 TL;DR

The CS5000 Fire Panel contains a hard-coded VNC password that cannot be changed, allowing attackers with knowledge of this password to gain remote administrative access. This affects all CS5000 Fire Panel systems with the vulnerable firmware, potentially enabling attackers to disable fire safety systems and create dangerous situations.

💻 Affected Systems

Products:
  • Consilium CS5000 Fire Panel
Versions: All versions with the vulnerable firmware (specific version details not provided in advisory)
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All CS5000 Fire Panels with the vulnerable firmware are affected by default. The hard-coded password is embedded in the binary and cannot be changed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full remote control of fire panels, disable fire detection/suppression systems during actual fires, leading to property damage, injuries, or loss of life.

🟠

Likely Case

Attackers gain remote access to fire panels, potentially disabling them or manipulating settings, creating false alarms, or preventing proper fire response.

🟢

If Mitigated

If network segmentation and access controls are properly implemented, risk is limited to internal network compromise rather than direct safety impacts.

🌐 Internet-Facing: HIGH - If fire panels are exposed to the internet, attackers can directly exploit this without any authentication.
🏢 Internal Only: HIGH - Even internally, any network-accessible panel can be compromised by attackers who gain internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded password and network access to the VNC service. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact vendor for specific firmware version

Vendor Advisory: https://www.consiliumsafety.com/en/support/

Restart Required: Yes

Instructions:

1. Contact Consilium support for updated firmware. 2. Schedule maintenance window. 3. Backup current configuration. 4. Apply firmware update following vendor instructions. 5. Verify system functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate fire panel network from other networks and internet

Access Control Lists

all

Implement strict firewall rules to limit VNC access to authorized IPs only

🧯 If You Can't Patch

  • Physically disconnect fire panels from all networks if safety permits
  • Implement 24/7 monitoring of VNC access attempts and alert on any connections

🔍 How to Verify

Check if Vulnerable:

Check if CS5000 Fire Panel is accessible via VNC on default port (5900) and test with known hard-coded password (not publicly disclosed).

Check Version:

Check firmware version through panel interface or contact vendor for version verification

Verify Fix Applied:

After firmware update, verify VNC service no longer accepts the hard-coded password and requires proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • VNC authentication attempts
  • Multiple failed VNC login attempts followed by success
  • Unusual VNC connections from unexpected IPs

Network Indicators:

  • VNC traffic to fire panel systems
  • Port 5900 connections to fire panel IPs
  • VNC protocol handshakes

SIEM Query:

source_ip="*" AND dest_port=5900 AND protocol="VNC" AND (event_type="authentication_success" OR event_type="connection_established")

🔗 References

📤 Share & Export