Cyber Posture

CVE-2026-39920

CriticalPublic PoC

Published: 24 April 2026

Published
24 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using…

more

default credentials, upload a malicious Java archive as a web service, and execute arbitrary commands on the host via SOAP requests to the deployed service.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces secure configuration settings to disable exposure of the Apache Axis2 administration module on network-accessible endpoints and eliminate default credentials.

prevent

Restricts system to least functionality by disabling unnecessary administration consoles, preventing exploitation of exposed services for arbitrary command execution.

prevent

Mandates management of authenticators to prohibit default or weak credentials, blocking initial authentication to the vulnerable Axis2 admin console.

Security SummaryAI

CVE-2026-39920 is a critical remote code execution vulnerability affecting BridgeHead FileStore versions prior to 24A, released in early 2024. The issue stems from the exposure of the Apache Axis2 administration module on network-accessible endpoints using default credentials. This configuration allows unauthenticated remote attackers to gain access and execute arbitrary operating system commands, as mapped to CWEs-1188 (Insecure Default Initialization of Resource) and CWE-1391 (Use of Weak Credentials). The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and lack of prerequisites.

Any unauthenticated attacker with network access to the affected BridgeHead FileStore instance can exploit this vulnerability. The attack begins with authenticating to the Axis2 admin console using the default credentials, followed by uploading a malicious Java archive (JAR) file as a web service. Once deployed, attackers send SOAP requests to the service to execute arbitrary OS commands on the host system, potentially leading to full compromise including data exfiltration, persistence, or lateral movement.

Advisories, including those from VulnCheck and BridgeHead Software, recommend upgrading to FileStore version 24A, which resolves the exposure of the Apache Axis2 admin module. Additional guidance from Apache Axis2 documentation and related JIRA issue AXIS2-4279 highlights securing or disabling the admin console to prevent default credential exploitation. A proof-of-concept exploit is available via a public GitHub Gist, underscoring the need for immediate patching.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Exposes Apache Axis2 admin module with default credentials (T1078.001) on public-facing endpoint, enabling exploitation (T1190) to upload/deploy malicious JAR web service for arbitrary OS command execution (T1100).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References