CVE-2025-35021: Abilis CPX Fallback Shell Connection Relay
AHA! has discovered an issue with Abilis CPX devices, and is publishing this disclosure in accordance with runZero’s standard disclosure policy today, November 3, 2025. CVE-2025-35021 has been assigned to this issue. Any questions about this disclosure should be directed to [email protected].
The GCVE identifier for this issue is GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111111111011111111110000000000000000000000000000000000000000000000000000000100
Executive Summary
By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections. This issue is an instance of CWE-1188, ‘Initialization of a Resource with an Insecure Default,’ and is estimated to have a CVSS 3.1 score of 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). The relevant SSVC vectors for this vulnerability are Exploitation: PoC and Technical Impact: Partial.
