IAP Firmware: CVE-2025-2567 "Lantronix Missing Authentication for Critical Function" vulnerability

IAP Firmware: CVE-2025-2567 "Lantronix Missing Authentication for Critical Function" vulnerability

IAP-Firmware: CVE-2025-2567 "Lantronix Missing Authentication for Critical Function" vulnerability.

 

The vulnerability 'CVE-2025-2567' has been resolved in the IAP firmware version 5.0.0.0.

The latest firmware introduces the following changes by default:

  • TFTP is disabled.

  • Telnet authentication is enabled.

  • The default modbus port is set to 0.

  • A default password has been configured.

 
The new default settings will be functional after the device is factory reset.
A] The default password will be set as L@ntr0n1x, (the password includes ZERO and not O) for the below listed devices.
-> For xport-05-IAP, UDS1100-IAP, xPress DR+ and XPress DR-IAP manufactured before year 2020.

B] For xDirect-IAP, manufactured before year 2020, credentials are same as before.
Username: admin
Password: PASS

C] The default password is last 8 bytes of Device ID for UDS1100-IAP, XPress DR-IAP, xPress DR+ and xDirect-IAP manufactured after year 2020.

NOTE: The new default settings/changes will be functional after the device is factory reset.

Users are strongly advised to replace the default password with a unique and secure one after first login or factory default the device.

Please refer to the following link for instructions to address the issue of Missing Authentication for Critical Function.


[Originally Published On: 04/28/2025 09:52 AM]