Cleartext Password Storage Vulnerability in FaceSentry Access Control System by FaceSentry
CVE-2019-25279
Key Information:
- Vendor
Iwt Ltd.
- Vendor
- CVE Published:
- 7 January 2026
Badges
What is CVE-2019-25279?
The FaceSentry Access Control System version 6.4.8 is susceptible to a vulnerability that involves the insecure storage of passwords. This flaw allows attackers to access unencrypted credentials stored in the device's SQLite database. Specifically, sensitive login information can be directly read from the file located at /faceGuard/database/FaceSentryWeb.sqlite, without requiring additional authentication. This presents a significant risk as it exposes critical user data, enabling unauthorized access to systems relying on this access control solution.
Affected Version(s)
FaceSentry Access Control System 6.4.8 build 264
FaceSentry Access Control System 5.7.2 build 568
FaceSentry Access Control System 5.7.0 build 539
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
