CVE-2025-46412

9.8 CRITICAL

📋 TL;DR

This authentication bypass vulnerability in Vertiv products allows attackers to access webserver functions without proper credentials. Affected organizations using vulnerable Vertiv equipment are at risk of unauthorized access to critical infrastructure management interfaces.

💻 Affected Systems

Products:
  • Vertiv Avocent MergePoint Unity 2016
  • Vertiv Avocent MergePoint Unity 2020
Versions: All versions prior to 2.1.0.103
Operating Systems: Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: These are KVM-over-IP and serial console management devices used in data centers and industrial environments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of affected Vertiv devices, allowing attackers to modify configurations, disrupt operations, or pivot to other network systems.

🟠

Likely Case

Unauthorized access to device management interfaces leading to configuration changes, service disruption, or data exfiltration.

🟢

If Mitigated

Limited impact if devices are isolated, have strong network controls, and authentication bypass attempts are detected and blocked.

🌐 Internet-Facing: HIGH - Directly exposed devices can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-288 indicates authentication bypass through alternative path or channel, suggesting relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.0.103

Vendor Advisory: https://www.vertiv.com/en-us/support/security-support-center/

Restart Required: Yes

Instructions:

1. Download firmware version 2.1.0.103 from Vertiv support portal. 2. Backup current configuration. 3. Upload and apply firmware update through web interface. 4. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Network isolation

all

Restrict network access to affected devices using firewall rules

Access control lists

all

Implement strict IP-based access controls to management interfaces

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules
  • Implement network monitoring and alerting for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version through web interface or CLI. Versions below 2.1.0.103 are vulnerable.

Check Version:

Check via web interface at System > About or use SSH/Telnet to query version

Verify Fix Applied:

Confirm firmware version shows 2.1.0.103 or higher in device management interface.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to webserver functions
  • Authentication bypass patterns in web logs
  • Configuration changes without proper authentication

Network Indicators:

  • Unusual traffic patterns to device management ports
  • Access from unauthorized IP addresses to management interfaces

SIEM Query:

source="vertiv-device" AND (event_type="auth_failure" OR event_type="config_change") AND user="unknown"

🔗 References

📤 Share & Export