PatchSiren cyber security CVE debrief
CVE-2025-46273 Planet Technology CVE debrief
CVE-2025-46273 is a critical authentication flaw affecting multiple Planet Technology products. CISA states that all affected products use hard-coded credentials, which could allow an unauthenticated attacker to gain administrative privileges to UNI-NMS managed devices. The advisory was published on 2025-04-24 and revised on 2025-05-06 for typo fixes; the underlying risk remains unchanged.
- Vendor
- Planet Technology
- Product
- UNI-NMS-Lite
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-24
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-24
- Advisory updated
- 2025-05-06
Who should care
Organizations using Planet Technology UNI-NMS-Lite, NMS-500, NMS-1000V, WGS-804HPT-V2, or WGS-4215-8T2S should treat this as urgent, especially if any affected device is reachable from untrusted networks or used to manage broader device fleets.
Technical summary
According to the CISA CSAF advisory, affected Planet Technology products contain hard-coded credentials. That design flaw can let an unauthenticated network attacker obtain administrative privileges. The reported impact is especially serious because compromise of UNI-NMS-managed infrastructure can extend beyond a single appliance and affect managed devices as well. The provided CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, matching a 9.8 critical score.
Defensive priority
Highest. This is an unauthenticated, network-reachable credential flaw with full confidentiality, integrity, and availability impact in the advisory’s scoring. Prioritize patching and exposure reduction immediately.
Recommended defensive actions
- Apply the vendor patches referenced in the advisory for all affected Planet Technology products.
- Inventory deployments of UNI-NMS-Lite, NMS-500, NMS-1000V, WGS-804HPT-V2, and WGS-4215-8T2S to confirm affected versions are identified.
- If any affected device is exposed to untrusted networks, restrict access until patched by limiting management-plane reachability and using trusted administrative paths only.
- Review administrative access logs and configuration changes for signs of unauthorized access to management interfaces.
- Validate that no stale or default administrative access paths remain in place after remediation.
- Follow CISA industrial control system recommended practices for defense in depth and ongoing monitoring.
Evidence notes
All substantive claims are taken from the supplied CISA CSAF advisory corpus and its listed official references. The advisory explicitly states that affected products use hard-coded credentials and that this could allow an unauthenticated attacker to gain administrative privileges to UNI-NMS managed devices. The revision history notes a second publication on 2025-05-06 with typo fixes only. No KEV listing was provided.
Official resources
-
CVE-2025-46273 CVE record
CVE.org
-
CVE-2025-46273 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory on 2025-04-24 and revised it on 2025-05-06 for typo fixes. The CVE is not listed in KEV in the supplied data.