CVE-2025-60639

6.5 MEDIUM

📋 TL;DR

This CVE involves hardcoded credentials in the ATLAS-EPIC software, allowing attackers to gain unauthorized access to systems running vulnerable versions. Anyone using ATLAS-EPIC with the affected commit is vulnerable to credential-based attacks.

💻 Affected Systems

Products:
  • ATLAS-EPIC
Versions: Commit f29312c and potentially earlier versions
Operating Systems: All platforms running ATLAS-EPIC
Default Config Vulnerable: ⚠️ Yes
Notes: Any deployment using the vulnerable commit is affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through credential theft leading to data exfiltration, privilege escalation, or lateral movement within the network.

🟠

Likely Case

Unauthorized access to application functionality, potential data leakage, and system manipulation using the exposed credentials.

🟢

If Mitigated

Limited impact with proper network segmentation, credential rotation, and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the hardcoded credentials, which may be discoverable through code analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit after f29312c

Vendor Advisory: https://github.com/gsiegel14/ATLAS-EPIC/commit/f29312cf782ec5a6537fceaeb6a9ced7d7d04e1f

Restart Required: No

Instructions:

1. Update to the latest ATLAS-EPIC version or apply the fix commit. 2. Remove any hardcoded credentials from configuration files. 3. Rotate all credentials used by the application.

🔧 Temporary Workarounds

Credential Rotation

all

Manually change all hardcoded credentials in the application configuration

Access Restriction

all

Implement network-level access controls to limit who can reach the ATLAS-EPIC service

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ATLAS-EPIC systems
  • Deploy credential monitoring and alerting for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check if your ATLAS-EPIC installation includes commit f29312c or earlier versions with hardcoded credentials

Check Version:

git log --oneline | grep f29312c

Verify Fix Applied:

Verify that hardcoded credentials have been removed from configuration files and replaced with secure credential management

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts using known hardcoded credentials
  • Unusual access patterns to ATLAS-EPIC services

Network Indicators:

  • Traffic to ATLAS-EPIC ports from unexpected sources
  • Credential stuffing attempts

SIEM Query:

source="ATLAS-EPIC" AND (event_type="authentication" AND (username="hardcoded_user" OR password="hardcoded_pass"))

🔗 References

📤 Share & Export