
Cloud Vulnerability DB
A community-led vulnerabilities database
A hardcoded credential vulnerability (CVE-2025-34034) was discovered in the Blue Angel Software Suite deployed on embedded Linux systems. The vulnerability was disclosed on June 23, 2025, and affects all versions of the software. The application contains multiple known default and hardcoded user accounts that are not documented in public documentation, allowing unauthenticated or low-privilege attackers to gain administrative access to the device's web interface (VulnCheck Advisory, NVD).
The vulnerability is classified as CWE-798 (Use of Hard-coded Credentials) and has received a CVSS v4.0 base score of 9.3 CRITICAL with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. The vulnerability stems from multiple hardcoded user accounts embedded in the system, including default credentials that are not publicly documented (VulnCheck Advisory).
The impact of this vulnerability is severe as it allows attackers to gain administrative access to the device's web interface without requiring authentication or with minimal privileges. This access could potentially lead to complete system compromise, unauthorized configuration changes, and access to sensitive information (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."