Home

Description

Milestone Systems has discovered a security vulnerability in Milestone XProtect installer that resets system configuration password after the upgrading from older versions using specific installers. The system configuration password is an additional, optional protection that is enabled on the Management Server. To mitigate the issue, we highly recommend updating system configuration password via GUI with a standard procedure. Any system upgraded with 2024 R1 or 2024 R2 release installer is vulnerable to this issue. Systems upgraded from 2023 R3 or older with version 2025 R1 and newer are not affected.

PUBLISHED Reserved 2025-02-25 | Published 2025-04-15 | Updated 2025-09-09 | Assigner Milestone




MEDIUM: 5.5CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H

MEDIUM: 5.5CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L

Problem types

CWE-1394: Use of Default Cryptographic Key

Product status

Default status
unaffected

24.1 (custom)
affected

References

supportcommunity.milestonesys.com/...rt=000069835&lang=en_US

cve.org (CVE-2025-1688)

nvd.nist.gov (CVE-2025-1688)

Download JSON