VYPR
High severity7.3NVD Advisory· Published Sep 25, 2025· Updated Apr 15, 2026

CVE-2025-59816

CVE-2025-59816

Description

This vulnerability allows attackers to directly query the underlying database, potentially retrieving all data stored in the Billing Admin database, including user credentials. User passwords are stored in plaintext, significantly increasing the severity of this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-59816 allows unauthenticated attackers to query the Billing Admin database, exposing all data including plaintext user passwords.

Vulnerability

Overview

The Billing Admin component in Zenitel ICX systems (ICX-500, ICX-510, ICX-Core) contains a flaw that permits direct, unauthenticated queries to the underlying database. This vulnerability stems from insufficient access controls on the billing web interface, which was re-enabled in a prior software version. As a result, an attacker can retrieve the entire contents of the Billing Admin database, including user credentials that are stored in plaintext [1].

Exploitation

An attacker can exploit this vulnerability remotely without any prior authentication or special network position. The attack surface is the billing web interface, which is exposed on the network. By sending crafted requests to the vulnerable endpoint, the attacker can bypass intended restrictions and execute arbitrary database queries. No user interaction is required, making this a high-severity issue with a CVSS v3 score of 7.3.

Impact

Successful exploitation leads to complete disclosure of the Billing Admin database. This includes all user accounts and their associated plaintext passwords, significantly increasing the risk of account takeover. An attacker could use the exposed credentials to gain administrative access to the ICX system, potentially compromising the entire communication infrastructure managed by the device.

Mitigation

Zenitel addressed this vulnerability in ICX version 1.4.3.3, released on September 15, 2025. The release notes for this version include a security fix (MTN-4791) that re-enables the billing web with proper access controls [1]. Users are strongly advised to upgrade to ICX 1.4.3.3 or later. No workarounds have been documented; upgrading is the only recommended mitigation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.