BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using default credentials, upload a malicious Java archive as a web service, and execute arbitrary commands on the host via SOAP requests to the deployed service.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using default credentials, upload a malicious Java archive as a web service, and execute arbitrary commands on the host via SOAP requests to the deployed service. | |
| Title | BridgeHead FileStore < 24A Apache Axis2 Default Credentials RCE | |
| Weaknesses | CWE-1188 CWE-1391 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-24T18:17:02.370Z
Reserved: 2026-04-07T20:57:06.210Z
Link: CVE-2026-39920
Updated: 2026-04-24T17:26:00.534Z
Status : Deferred
Published: 2026-04-24T16:16:36.267
Modified: 2026-04-24T17:55:55.317
Link: CVE-2026-39920
No data.
OpenCVE Enrichment
No data.