No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 11 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netbox
Netbox netbox-docker |
|
| Vendors & Products |
Netbox
Netbox netbox-docker |
Wed, 11 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | netbox-docker before 2.5.0 has a superuser account with default credentials (admin password for the admin account, and 0123456789abcdef0123456789abcdef01234567 value for SUPERUSER_API_TOKEN). In practice on the public Internet, almost all users changed the password but only about 90% changed the token. Having a default token value was intentional and was valuable for the main intended use case of the netbox-docker product (isolated development networks). Some users engaged in an effort to repurpose netbox-docker for production. The documentation for this effort stated that the defaults must not be used. However, installation did not ensure non-default values. The Supplier was aware of the CVE ID assignment and did not object to the assignment. | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-11T14:23:00.621Z
Reserved: 2023-03-03T00:00:00.000Z
Link: CVE-2023-27573
Updated: 2026-03-11T14:22:30.552Z
Status : Awaiting Analysis
Published: 2026-03-11T06:17:11.933
Modified: 2026-03-11T13:52:47.683
Link: CVE-2023-27573
No data.
OpenCVE Enrichment
Updated: 2026-03-11T11:39:01Z