5 vulnerabilities classified as CWE-262 (未使用口令老化机制). AI Chinese analysis included.
CWE-262 represents a security weakness where software fails to implement password aging mechanisms, allowing credentials to remain valid indefinitely. This vulnerability is typically exploited by attackers who obtain user credentials through phishing, brute force, or data breaches, as the stolen passwords retain access privileges for extended periods without requiring renewal. Without forced rotation, compromised accounts remain accessible until the attacker is detected or the password is manually changed. Developers mitigate this risk by enforcing strict password rotation policies that compel users to update their credentials after a predefined interval, such as thirty or ninety days. Additionally, implementing multi-factor authentication and monitoring for anomalous login activities further reduces the window of opportunity for attackers, ensuring that even if a password is compromised, its utility is significantly limited by time constraints and additional verification layers.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-60010 | Junos OS and Junos OS Evolved: Device allows login for user with expired password — Junos OS | 5.4 | Medium | 2025-10-09 |
| CVE-2025-58435 | Open OnDemand didn't rotate password for VNC batch_connect — ondemand | 8.1AI | HighAI | 2025-09-09 |
| CVE-2023-1555 | Missing Authorization in GitLab — GitLab | 2.7 | Low | 2023-09-01 |
| CVE-2023-2022 | Missing Authorization in GitLab — GitLab | 4.3 | Medium | 2023-08-02 |
| CVE-2022-22767 | BD Pyxis™ Products – Default Credentials — BD Pyxis™ Anesthesia ES Station | 8.8 | High | 2022-06-01 |
Vulnerabilities classified as CWE-262 (未使用口令老化机制) represent 5 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.