Azure Access Security Vulnerabilities (CVEs)
Track 28 security vulnerabilities affecting Azure Access products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability in BLU-IC2 and BLU-IC4 email servers disables certificate verification, allowing man-in-the-middle attacks. Attackers can intercept...
Oct 31, 2025This CVE describes a missing security headers vulnerability in BLU-IC2 and BLU-IC4 devices through version 1.19.5. Attackers can exploit this to condu...
Oct 31, 2025CVE-2025-12552 is a critical authentication vulnerability in BLU-IC2 and BLU-IC4 devices where insufficient password policies allow weak or default cr...
Oct 31, 2025This vulnerability involves a mismatch between the credits page and actual firmware versions in BLU-IC2 and BLU-IC4 devices, potentially allowing atta...
Oct 30, 2025This vulnerability in BLU-IC2 and BLU-IC4 devices allows attackers to trigger systemic internal server errors (HTTP 500 responses) that could potentia...
Oct 30, 2025This vulnerability allows attackers to perform unauthorized actions on behalf of authenticated users by exploiting the lack of CSRF protection in BLU-...
Oct 29, 2025CVE-2025-12476 is a critical authentication bypass vulnerability affecting BLU-IC2 and BLU-IC4 devices. Attackers can access sensitive resources witho...
Oct 29, 2025This vulnerability allows attackers to obtain server version information from BLU-IC2 and BLU-IC4 devices. This information disclosure can facilitate ...
Oct 29, 2025A protocol manipulation vulnerability in BLU-IC2 and BLU-IC4 devices allows attackers to cause denial of service by sending specially crafted network ...
Oct 28, 2025This vulnerability allows local attackers to escalate privileges by exploiting a SUID-bit binary in BLU-IC2 and BLU-IC4 devices. Attackers can gain ro...
Oct 28, 2025This vulnerability allows attackers to write arbitrary files through a vulnerable upgrade feature in BLU-IC2 and BLU-IC4 devices. Successful exploitat...
Oct 28, 2025This vulnerability involves error messages being exposed in HTTP headers, potentially leaking sensitive information about the system. It affects BLU-I...
Oct 27, 2025This vulnerability allows unauthorized disclosure of email passwords in BLU-IC2 and BLU-IC4 devices. Attackers can potentially access sensitive email ...
Oct 27, 2025CVE-2025-12364 is a weak password policy vulnerability affecting BLU-IC2 and BLU-IC4 devices. This allows attackers to easily guess or brute-force pas...
Oct 27, 2025This vulnerability in BLU-IC2 and BLU-IC4 web interfaces allows attackers to submit malicious input due to insufficient validation. It affects all ver...
Oct 26, 2025CVE-2025-12285 is a missing initial password change vulnerability affecting BLU-IC2 and BLU-IC4 devices. This allows attackers to access systems using...
Oct 26, 2025This vulnerability allows attackers to manipulate mail configuration files and execute arbitrary commands on affected BLU-IC2 and BLU-IC4 devices. Att...
Oct 26, 2025This vulnerability involves BLU-IC2 and BLU-IC4 devices using the default SNMP community string 'public', which allows unauthorized access to SNMP ser...
Oct 25, 2025This critical vulnerability in Azure Access OS affects BLU-IC2 and BLU-IC4 devices, allowing attackers to potentially execute arbitrary code or gain u...
Oct 25, 2025This CVE bundles multiple known vulnerabilities in BusyBox 1.31.1 affecting BLU-IC2 and BLU-IC4 devices up to version 1.19.5. The vulnerabilities coul...
Oct 25, 2025A vulnerability in BLU-IC2 and BLU-IC4 devices allows malicious or malformed applications to be installed but not uninstalled, potentially leading to ...
Oct 25, 2025CVE-2025-12176 involves undocumented administrative accounts being automatically created to facilitate application access on BLU-IC2 and BLU-IC4 devic...
Oct 24, 2025This vulnerability in BLU-IC2 and BLU-IC4 devices allows information leakage through an enabled serial console, potentially exposing system details th...
Oct 23, 2025This vulnerability involves outdated UI dependencies in BLU-IC2 and BLU-IC4 devices that could allow attackers to execute arbitrary code or compromise...
Oct 23, 2025This vulnerability allows attackers to read sensitive cookies via JavaScript due to missing Secure and HttpOnly attributes. It affects BLU-IC2 and BLU...
Oct 21, 2025This vulnerability allows attackers to inject malicious scripts into application manifests, which could lead to stored cross-site scripting (XSS) atta...
Oct 20, 2025This vulnerability allows HTML/JavaScript injection in API responses due to incorrect Content-Type headers. Attackers could potentially execute cross-...
Oct 17, 2025This CVE describes a resource allocation vulnerability in Azure Access Technology BLU-IC2 and BLU-IC4 devices that allows attackers to flood the syste...
Oct 15, 2025Why Monitor Azure Access Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 28+ known vulnerabilities affecting Azure Access products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Azure Access packages in under 60 seconds. No agents required - completely agentless scanning that works across Azure Access deployments.
Free vulnerability database: Access detailed information about every Azure Access CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Azure Access CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions