First published: Fri May 02 2025(Updated: )
Digigram's PYKO-OUT audio-over-IP (AoIP) web-server does not require a password by default, allowing any attacker with the target IP address to connect and compromise the device, potentially pivoting to connected network or hardware devices.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digigram PYKO-OUT |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3927 is rated as a high severity vulnerability due to the lack of password protection allowing unauthorized access.
To fix CVE-2025-3927, it is recommended to enable password protection on the Digigram PYKO-OUT web server immediately.
The risks of CVE-2025-3927 include unauthorized access to the device, potential compromise of connected networks, and expose sensitive information.
CVE-2025-3927 affects users of the Digigram PYKO-OUT audio-over-IP system that are using default settings without password protection.
Currently, there is no official patch for CVE-2025-3927, so it's crucial to implement manual security measures such as setting a strong password.