This vulnerability arises because there are no limitations on the number
of authentication attempts a user can make. An attacker can exploit
this weakness by continuously sending authentication requests, leading
to a denial-of-service (DoS) condition. This can overwhelm the
authentication system, rendering it unavailable to legitimate users and
potentially causing service disruption. This can also allow attackers to
conduct brute-force attacks to gain unauthorized access.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

EVMAPA did not release a statement regarding this vulnerability. Contact EVMAPA directly for more information.

History

Fri, 23 Jan 2026 08:00:00 +0900

Type Values Removed Values Added
Description This vulnerability arises because there are no limitations on the number of authentication attempts a user can make. An attacker can exploit this weakness by continuously sending authentication requests, leading to a denial-of-service (DoS) condition. This can overwhelm the authentication system, rendering it unavailable to legitimate users and potentially causing service disruption. This can also allow attackers to conduct brute-force attacks to gain unauthorized access.
Title EVMAPA Improper Restriction of Excessive Authentication Attempts
Weaknesses CWE-307
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-01-22T22:37:36.978Z

Reserved: 2025-08-20T20:20:15.044Z

Link: CVE-2025-53968

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T23:15:49.800

Modified: 2026-01-22T23:15:49.800

Link: CVE-2025-53968

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses