Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-7884

Summary
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
Published At-20 Jul, 2025 | 11:02
Updated At-21 Jul, 2025 | 14:31
Rejected At-
Credits

Eluktronics Control Center REG File data authenticity

A vulnerability classified as problematic was found in Eluktronics Control Center 5.23.51.41. Affected by this vulnerability is an unknown functionality of the component REG File Handler. The manipulation leads to insufficient verification of data authenticity. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulDB
Assigner Org ID:1af790b2-7ee1-4545-860a-a788eba489b5
Published At:20 Jul, 2025 | 11:02
Updated At:21 Jul, 2025 | 14:31
Rejected At:
▼CVE Numbering Authority (CNA)
Eluktronics Control Center REG File data authenticity

A vulnerability classified as problematic was found in Eluktronics Control Center 5.23.51.41. Affected by this vulnerability is an unknown functionality of the component REG File Handler. The manipulation leads to insufficient verification of data authenticity. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected Products
Vendor
Eluktronics
Product
Control Center
Modules
  • REG File Handler
Versions
Affected
  • 5.23.51.41
Problem Types
TypeCWE IDDescription
CWECWE-345Insufficient Verification of Data Authenticity
Type: CWE
CWE ID: CWE-345
Description: Insufficient Verification of Data Authenticity
Metrics
VersionBase scoreBase severityVector
4.04.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
3.03.3LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
2.01.7N/A
AV:L/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR
Version: 4.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
Version: 3.0
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
Version: 2.0
Base score: 1.7
Base severity: N/A
Vector:
AV:L/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
pipapupa (VulDB User)
Timeline
EventDate
Advisory disclosed2025-07-19 00:00:00
VulDB entry created2025-07-19 02:00:00
VulDB entry last update2025-07-19 09:56:55
Event: Advisory disclosed
Date: 2025-07-19 00:00:00
Event: VulDB entry created
Date: 2025-07-19 02:00:00
Event: VulDB entry last update
Date: 2025-07-19 09:56:55
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.316999
vdb-entry
https://vuldb.com/?ctiid.316999
signature
permissions-required
https://vuldb.com/?submit.611436
third-party-advisory
https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85
exploit
Hyperlink: https://vuldb.com/?id.316999
Resource:
vdb-entry
Hyperlink: https://vuldb.com/?ctiid.316999
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/?submit.611436
Resource:
third-party-advisory
Hyperlink: https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85
Resource:
exploit
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85
exploit
Hyperlink: https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85
Resource:
exploit
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@vuldb.com
Published At:20 Jul, 2025 | 11:15
Updated At:22 Jul, 2025 | 13:06

A vulnerability classified as problematic was found in Eluktronics Control Center 5.23.51.41. Affected by this vulnerability is an unknown functionality of the component REG File Handler. The manipulation leads to insufficient verification of data authenticity. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.04.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Secondary2.01.7LOW
AV:L/AC:L/Au:S/C:N/I:P/A:N
Type: Secondary
Version: 4.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Type: Secondary
Version: 2.0
Base score: 1.7
Base severity: LOW
Vector:
AV:L/AC:L/Au:S/C:N/I:P/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-345Secondarycna@vuldb.com
CWE ID: CWE-345
Type: Secondary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85cna@vuldb.com
N/A
https://vuldb.com/?ctiid.316999cna@vuldb.com
N/A
https://vuldb.com/?id.316999cna@vuldb.com
N/A
https://vuldb.com/?submit.611436cna@vuldb.com
N/A
https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?ctiid.316999
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?id.316999
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?submit.611436
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://drive.proton.me/urls/5PQ1VRZ3CG#M2JyUWapaX85
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2023-20570
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-3.3||LOW
EPSS-0.03% / 6.87%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 17:14
Updated-22 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient verification of data authenticity in the configuration state machine may allow a local attacker to potentially load arbitrary bitstreams.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-kintex_ultrascale_ku025virtex_ultrascale_xcvu190_firmwarevirtex_ultrascale_xcvu065_firmwarevirtex_ultrascale\+_vu13p_firmwarealveo_u200artix_ultrascale\+_au25pvirtex_ultrascale\+_vu45p_firmwarekintex_ultrascale\+_ku13p_firmwarealveo_u250virtex_ultrascale_xcvu125_firmwarevirtex_ultrascale\+_vu5pkintex_ultrascale_ku095virtex_ultrascale\+_vu31p_firmwareartix_ultrascale\+_au10p_firmwarevirtex_ultrascale\+_vu37palveo_u280_firmwarevirtex_ultrascale\+_vu29p_firmwarevirtex_ultrascale\+_vu35p_firmwarevirtex_ultrascale\+_vu31pkintex_ultrascale_ku115_firmwarevirtex_ultrascale\+_vu47pvirtex_ultrascale_xcvu440_firmwarekintex_ultrascale\+_ku3p_firmwarevirtex_ultrascale_xcvu095_firmwarevirtex_ultrascale\+_vu9partix_ultrascale\+_au7pkintex_ultrascale\+_ku9p_firmwarekintex_ultrascale_ku085alveo_u50virtex_ultrascale\+_vu3pkintex_ultrascale\+_ku15pvirtex_ultrascale\+_vu11pkintex_ultrascale\+_ku5pkintex_ultrascale_ku115alveo_u280virtex_ultrascale\+_vu35pvirtex_ultrascale\+_vu33p_firmwarevirtex_ultrascale\+_vu37p_firmwarevirtex_ultrascale\+_vu19p_firmwarevirtex_ultrascale_xcvu160_firmwarevirtex_ultrascale_xcvu160virtex_ultrascale\+_vu45pvirtex_ultrascale\+_vu23p_firmwareartix_ultrascale\+_au10pvirtex_ultrascale\+_vu23pvirtex_ultrascale\+_vu13pkintex_ultrascale_ku040_firmwarekintex_ultrascale\+_ku11p_firmwareartix_ultrascale\+_au20pvirtex_ultrascale_xcvu440artix_ultrascale\+_au15p_firmwarevirtex_ultrascale\+_vu9p_firmwarevirtex_ultrascale\+_vu57p_firmwarevirtex_ultrascale\+_vu33pkintex_ultrascale_ku060virtex_ultrascale_xcvu080virtex_ultrascale\+_vu7pkintex_ultrascale_ku025_firmwarevirtex_ultrascale_xcvu125virtex_ultrascale\+_vu57partix_ultrascale\+_au15pkintex_ultrascale\+_ku19p_firmwarealveo_u50_firmwarevirtex_ultrascale\+_vu19pkintex_ultrascale\+_ku5p_firmwarealveo_u250_firmwarevirtex_ultrascale\+_vu29pkintex_ultrascale_ku035_firmwarevirtex_ultrascale\+_vu7p_firmwarevirtex_ultrascale_xcvu190virtex_ultrascale\+_vu47p_firmwarekintex_ultrascale\+_ku15p_firmwareartix_ultrascale\+_au20p_firmwarevirtex_ultrascale\+_vu3p_firmwarekintex_ultrascale_ku035kintex_ultrascale\+_ku19pkintex_ultrascale_ku060_firmwarekintex_ultrascale\+_ku13pvirtex_ultrascale_xcvu065virtex_ultrascale_xcvu095artix_ultrascale\+_au7p_firmwarevirtex_ultrascale\+_vu11p_firmwarekintex_ultrascale\+_ku3partix_ultrascale\+_au25p_firmwarevirtex_ultrascale\+_vu5p_firmwarevirtex_ultrascale\+_vu27p_firmwarealveo_u200_firmwarevirtex_ultrascale\+_vu27pkintex_ultrascale_ku040kintex_ultrascale_ku095_firmwarekintex_ultrascale\+_ku9pvirtex_ultrascale_xcvu080_firmwarekintex_ultrascale_ku085_firmwarekintex_ultrascale\+_ku11pAlveo™ Card (UltraScale™and UltraScale+™ based)Kintex™UltraScale+™ FPGAArtix™ UltraScale+™ FPGAKintex™ UltraScale™ FPGAVirtex™ UltraScale+™FPGAVirtex™ UltraScale™ FPGA
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2019-1667
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4||MEDIUM
EPSS-0.03% / 6.28%
||
7 Day CHG~0.00%
Published-21 Feb, 2019 | 20:00
Updated-21 Nov, 2024 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco HyperFlex Arbitrary Statistics Write Vulnerability

A vulnerability in the Graphite interface of Cisco HyperFlex software could allow an authenticated, local attacker to write arbitrary data to the Graphite interface. The vulnerability is due to insufficient authorization controls. An attacker could exploit this vulnerability by connecting to the Graphite service and sending arbitrary data. A successful exploit could allow the attacker to write arbitrary data to Graphite, which could result in invalid statistics being presented in the interface. Versions prior to 3.5(2a) are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-hyperflex_hx_data_platformCisco HyperFlex HX-Series
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-41106
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.26%
||
7 Day CHG~0.00%
Published-28 Sep, 2021 | 20:50
Updated-04 Aug, 2024 | 02:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
File reference keys leads to incorrect hashes on HMAC algorithms

JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, users are lead to believe that everything works properly. Versions 3.4.6, 4.0.4, and 4.1.5 have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative. As a workaround, use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of one's keys.

Action-Not Available
Vendor-jwt_projectlcobucci
Product-jwtjwt
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-3349
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 28.98%
||
7 Day CHG~0.00%
Published-01 Feb, 2021 | 04:04
Updated-03 Aug, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior

Action-Not Available
Vendor-n/aThe GNOME Project
Product-evolutionn/a
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
Details not found