🔐 CVE Alert

CVE-2026-25601

MEDIUM 6.4

Credential Exposure vulnerability in MEPIS RM

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was identified in MEPIS RM, an industrial software product developed by Metronik. The application contained a hardcoded cryptographic key within the Mx.Web.ComponentModel.dll component. When the option to store domain passwords was enabled, this key was used to encrypt user passwords before storing them in the application’s database. An attacker with sufficient privileges to access the database could extract the encrypted passwords, decrypt them using the embedded key, and gain unauthorized access to the associated ICS/OT environment.

CWE CWE-798
Vendor metronik d.o.o.
Product mepis rm
Published Apr 1, 2026
Last Updated Apr 1, 2026
Stay Ahead of the Next One

Get instant alerts for metronik d.o.o. mepis rm

Be the first to know when new medium vulnerabilities affecting metronik d.o.o. mepis rm are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Metronik d.o.o. / MEPIS RM
0 < 8.2.0107 0 < 8.2.0007 build 15

References

NVD ↗ CVE.org ↗ EPSS Data ↗
cert.si: https://www.cert.si/en/cve-2026-25601/