Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-32644

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-27 Apr, 2026 | 23:40
Updated At-28 Apr, 2026 | 14:45
Rejected At-
Credits

Milesight Cameras Use of Hard-coded Cryptographic Key

Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:27 Apr, 2026 | 23:40
Updated At:28 Apr, 2026 | 14:45
Rejected At:
▼CVE Numbering Authority (CNA)
Milesight Cameras Use of Hard-coded Cryptographic Key

Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.

Affected Products
Vendor
MilesightMilesight
Product
MS-Cxx63-PD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx64-xPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx73-xPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx75-xxPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx83-xPD
Default Status
unaffected
Versions
Affected
  • From 0 through 51.7.0.77-r12 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx74-PA
Default Status
unaffected
Versions
Affected
  • From 0 through 3x.8.0.3-r11 (custom)
Vendor
MilesightMilesight
Product
MS-C8477-HPG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r3 (custom)
Vendor
MilesightMilesight
Product
MS-C8477-PC
Default Status
unaffected
Versions
Affected
  • From 0 through 48.8.0.4-r3 (custom)
Vendor
MilesightMilesight
Product
MS-C5321-FPE
Default Status
unaffected
Versions
Affected
  • From 0 through 62.8.0.4-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx62-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx52-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxGPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx61-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx67-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx71-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx41-xxxPE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx76-PE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx65-PE
Default Status
unaffected
Versions
Affected
  • From 0 through 61.8.0.5-r2 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.5-r3 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx62-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.5-r3 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.5-r3 (custom)
Vendor
MilesightMilesight
Product
MS-CQxx31-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through CQ_63.8.0.5-r1 (custom)
Vendor
MilesightMilesight
Product
MS-CQxx68-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through CQ_63.8.0.5-r1 (custom)
Vendor
MilesightMilesight
Product
MS-CQxx72-xxxG1
Default Status
unaffected
Versions
Affected
  • From 0 through CQ_63.8.0.5-r1 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-NxE
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxC
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxE
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxG
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxH
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Nxxxx-xxT
Default Status
unaffected
Versions
Affected
  • From 0 through 7x.9.0.19-r5 (custom)
Vendor
MilesightMilesight
Product
PMC8266-FPE
Default Status
unaffected
Versions
Affected
  • From 0 through PO_61.8.0.4_LPR (custom)
Vendor
MilesightMilesight
Product
PMC8266-FGPE
Default Status
unaffected
Versions
Affected
  • From 0 through PO_61.8.0.4_LPR (custom)
Vendor
MilesightMilesight
Product
PM3322-E
Default Status
unaffected
Versions
Affected
  • From 0 through PI_61.8.0.3_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RIPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5366-X12RIPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4RIPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-RFIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4RIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-RFIVPG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RIWG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4RIWG1
Default Status
unaffected
Versions
Affected
  • From 0 through T_63.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5510-GVH
Default Status
unaffected
Versions
Affected
  • From 0 through T_47.8.0.4_LPR-r7 (custom)
Vendor
MilesightMilesight
Product
TS5510-GH
Default Status
unaffected
Versions
Affected
  • From 0 through T_47.8.0.4_LPR-r6 (custom)
Vendor
MilesightMilesight
Product
TS5511-GVH
Default Status
unaffected
Versions
Affected
  • From 0 through T_47.8.0.4_LPR-r6 (custom)
Vendor
MilesightMilesight
Product
TS2966-X12TPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5366-X12PE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4PE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS2966-X12TVPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RVPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS5366-X12VPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4VPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4441-X36RPE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4441-X36RE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS4466-X4RWE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
TS8266-X4WE
Default Status
unaffected
Versions
Affected
  • From 0 through T_61.8.0.4_LPR-r3 (custom)
Vendor
MilesightMilesight
Product
MS-C2964-RFLPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2972-RFLPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2966-RFLWPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2866-X4TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2866-X4TVPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2866-X4TGPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2841-X36TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2841-X36TPC/W
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2867-X5TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS2961-X12TPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
TS8266-FPC/P
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2966-X12RLPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C2966-X12RLVPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C5366-X12LPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C5366-X12LVPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-C5361-X12LPC
Default Status
unaffected
Versions
Affected
  • From 0 through T_45.8.0.3-r9 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-xxxxGOPC
Default Status
unaffected
Versions
Affected
  • From 0 through 45.8.0.2-AIoT-r4 (custom)
Vendor
MilesightMilesight
Product
SC211
Default Status
unaffected
Versions
Affected
  • From 0 through C_21.1.0.8-r4 (custom)
Vendor
MilesightMilesight
Product
SP111
Default Status
unaffected
Versions
Affected
  • From 0 through 52.8.0.4-r5 (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-RFIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-RFIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Vendor
MilesightMilesight
Product
MS-Cxx66-FIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Vendor
MilesightMilesight
Product
MS-Cxx72-FIPKG1
Default Status
unaffected
Versions
Affected
  • From 0 through 63.8.0.4-r1-NX (custom)
Problem Types
TypeCWE IDDescription
CWECWE-321CWE-321
Type: CWE
CWE ID: CWE-321
Description: CWE-321
Metrics
VersionBase scoreBase severityVector
4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Milesight advises all users to update their device to the latest firmware versions of PE/PC/PA found at https://www.milesight.com/support/download/firmware.  https://www.milesight.com/support/download/firmware MS-Cxx63-PD: Update to 51.7.0.77-r13 MS-Cxx64-xPD: Update to 51.7.0.77-r13 MS-Cxx73-xPD: Update to 51.7.0.77-r13 MS-Cxx75-xxPD: Update to 51.7.0.77-r13 MS-Cxx83-xPD: Update to 51.7.0.77-r13 MS-Cxx74-PA: Update to 3x.8.0.3-r13 MS-C8477-HPG1: Update to 63.8.0.4-r4  MS-C8477-PC: Update to 48.8.0.4-r4 MS-C5321-FPE: Update to 62.8.0.4-r6 MS-Cxx72-xxxPE: Update to 61.8.0.5-r2 MS-Cxx62-xxxPE: Update to 61.8.0.5-r2 MS-Cxx52-xxxPE: Update to 61.8.0.5-r2 MS-Cxx66-xxxPE: Update to 61.8.0.5-r2 MS-Cxx66-xxxGPE: Update to 61.8.0.5-r2 MS-Cxx61-xxxPE: Update to 61.8.0.5-r2 MS-Cxx67-xxxPE: Update to 61.8.0.5-r2 MS-Cxx71-xxxPE: Update to 61.8.0.5-r2 MS-Cxx41-xxxPE: Update to 61.8.0.5-r2 MS-Cxx76-PE: Update to 61.8.0.5-r2 MS-Cxx65-PE: Update to 61.8.0.5-r2 MS-Cxx66-xxxG1: Update to 63.8.0.5-r4 MS-Cxx62-xxxG1: Update to 63.8.0.5-r4 MS-Cxx72-xxxG1: Update to 63.8.0.5-r4 MS-CQxx31-xxxG1: Update to CQ_63.8.0.5-r2  MS-CQxx68-xxxG1: Update to CQ_63.8.0.5-r2 MS-CQxx72-xxxG1: Update to CQ_63.8.0.5-r2 MS-Nxxxx-NxE: Update to 7x.9.0.19-r6 MS-Nxxxx-xxC: Update to 7x.9.0.19-r6 MS-Nxxxx-xxE: Update to 7x.9.0.19-r6 MS-Nxxxx-xxG: Update to 7x.9.0.19-r6 MS-Nxxxx-xxH: Update to 7x.9.0.19-r6 MS-Nxxxx-xxT: Update to 7x.9.0.19-r6 PMC8266-FPE: Update to PO_61.8.0.4-r1 PMC8266-FGPE: Update to PO_61.8.0.4-r1 PM3322-E: Update to PI_61.8.0.3-r5 TS4466-X4RIPG1: Update to T_63.8.0.4-r4  TS5366-X12RIPG1: Update to T_63.8.0.4-r4 TS8266-X4RIPG1: Update to T_63.8.0.4-r4 TS4466-X4RIVPG1: Update to T_63.8.0.4-r4 TS4466-RFIVPG1: Update to T_63.8.0.4-r4 TS8266-X4RIVPG1: Update to T_63.8.0.4-r4 TS8266-RFIVPG1: Update to T_63.8.0.4-r4 TS4466-X4RIWG1: Update to T_63.8.0.4-r4 TS8266-X4RIWG1: Update to T_63.8.0.4-r4 TS5510-GVH: Update to T_47.8.0.4-r8 TS5510-GH: Update to T_47.8.0.4-r8 TS5511-GVH: Update to T_47.8.0.4-r8 TS2966-X12TPE: Update to T_61.8.0.4-r4 TS4466-X4RPE: Update to T_61.8.0.4-r4 TS5366-X12PE: Update to T_61.8.0.4-r4 TS8266-X4PE: Update to T_61.8.0.4-r4 TS2966-X12TVPE: Update to T_61.8.0.4-r4 TS4466-X4RVPE: Update to T_61.8.0.4-r4 TS5366-X12VPE: Update to T_61.8.0.4-r4 TS8266-X4VPE: Update to T_61.8.0.4-r4 TS4441-X36RPE: Update to T_61.8.0.4-r4 TS4441-X36RE: Update to T_61.8.0.4-r4 TS4466-X4RWE: Update to T_61.8.0.4-r4 TS8266-X4WE: Update to T_61.8.0.4-r4 MS-C2964-RFLPC: Update to T_45.8.0.3-r10 MS-C2972-RFLPC: Update to T_45.8.0.3-r10 MS-C2966-RFLWPC: Update to T_45.8.0.3-r10 TS2866-X4TPC: Update to T_45.8.0.3-r10 TS2866-X4TVPC: Update to T_45.8.0.3-r10 TS2866-X4TGPC: Update to T_45.8.0.3-r10 TS2841-X36TPC: Update to T_45.8.0.3-r10 TS2841-X36TPC/W: Update to T_45.8.0.3-r10 TS2867-X5TPC: Update to T_45.8.0.3-r10 TS2961-X12TPC: Update to T_45.8.0.3-r10 TS8266-FPC/P: Update to T_45.8.0.3-r10 MS-C2966-X12RLPC: Update to T_45.8.0.3-r10 MS-C2966-X12RLVPC: Update to T_45.8.0.3-r10 MS-C5366-X12LPC: Update to T_45.8.0.3-r10 MS-C5366-X12LVPC: Update to T_45.8.0.3-r10 MS-C5361-X12LPC: Update to T_45.8.0.3-r10 MS-Cxx66-xxxxGOPC: Update to 45.8.0.2-AIoT-r5 SC211: Update to C_21.1.0.8-r5 SP111: Update to 52.8.0.4-r6 MS-Cxx66-RFIPKG1: Update to 63.8.0.5-r2-NX MS-Cxx72-RFIPKG1: Update to 63.8.0.5-r2-NX MS-Cxx66-FIPKG1: Update to 63.8.0.5-r2-NX MS-Cxx72-FIPKG1: Update to 63.8.0.5-r2-NX

Milesight asks all users to report potential security vulnerabilities to security@milesight.com. mailto:security@milesight.com Learn more: Milesight Vulnerability Reporting Policy https://www.milesight.com/legal/vulnerability-report

Configurations

Workarounds

Exploits

Credits

finder
Souvik Kandar reported these vulnerabilities to CISA
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03
N/A
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.json
N/A
https://www.milesight.com/support/download/firmware
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03
Resource: N/A
Hyperlink: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.json
Resource: N/A
Hyperlink: https://www.milesight.com/support/download/firmware
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:28 Apr, 2026 | 01:16
Updated At:28 Apr, 2026 | 01:16

Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-321Primaryics-cert@hq.dhs.gov
CWE ID: CWE-321
Type: Primary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.jsonics-cert@hq.dhs.gov
N/A
https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03ics-cert@hq.dhs.gov
N/A
https://www.milesight.com/support/download/firmwareics-cert@hq.dhs.gov
N/A
Hyperlink: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-113-03.json
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://www.milesight.com/support/download/firmware
Source: ics-cert@hq.dhs.gov
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

71Records found

CVE-2023-27584
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-66.18% / 98.54%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 22:54
Updated-20 Dec, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dragonfly2 vulnerable to hard coded cyptographic key

Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, "Secret Key", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-dragonflyossdragonflyossThe Linux Foundation
Product-dragonflyDragonfly2dragonfly2
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-54807
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.08% / 23.98%
||
7 Day CHG~0.00%
Published-18 Sep, 2025 | 20:44
Updated-19 Sep, 2025 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dover Fueling Solutions ProGauge MagLink LX4 Devices Use of Hard-coded Cryptographic Key

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access to the system.

Action-Not Available
Vendor-Dover Fueling Solutions
Product-ProGauge MagLink LX PlusProGauge MagLink LX 4ProGauge MagLink LX Ultimate
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2023-2158
Matching Score-4
Assigner-Black Duck Software, Inc.
ShareView Details
Matching Score-4
Assigner-Black Duck Software, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.46% / 63.91%
||
7 Day CHG~0.00%
Published-27 Apr, 2023 | 17:04
Updated-31 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Impersonation through User-Controlled Token

Code Dx versions prior to 2023.4.2 are vulnerable to user impersonation attack where a malicious actor is able to gain access to another user's account by crafting a custom "Remember Me" token. This is possible due to the use of a hard-coded cipher which was used when generating the token. A malicious actor who creates this token can supply it to a separate Code Dx system, provided they know the username they want to impersonate, and impersonate the user.  Score 6.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

Action-Not Available
Vendor-synopsysSynopsys
Product-code_dxCode Dx
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-30206
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 27.31%
||
7 Day CHG~0.00%
Published-15 Apr, 2025 | 19:14
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dpanel's hard-coded JWT secret leads to remote code execution

Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage.

Action-Not Available
Vendor-donknap
Product-dpanel
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-453
Insecure Default Variable Initialization
CWE ID-CWE-547
Use of Hard-coded, Security-relevant Constants
CVE-2025-45746
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.86% / 75.06%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 00:00
Updated-21 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ZKT ZKBio CVSecurity 6.4.1_R an unauthenticated attacker can craft JWT token using the hardcoded secret to authenticate to the service console. NOTE: the Supplier disputes the significance of this report because the service console is typically only accessible from a local area network, and because access to the service console does not result in login access or data access in the context of the application software platform.

Action-Not Available
Vendor-ZKTeco Co., Ltd.
Product-zkbio_cvsecurityZKBio CVSecurity
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-32520
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 42.42%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:12
Updated-17 Sep, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN Storage Manager - Use of Hard-coded Cryptographic Key

Use of hard-coded cryptographic key vulnerability in QSAN Storage Manager allows attackers to obtain users’ credentials and related permissions. Suggest contacting with QSAN and refer to recommendations in QSAN Document.

Action-Not Available
Vendor-qsanQSAN
Product-storage_managerStorage Manager
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-41702
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.39%
||
7 Day CHG+0.03%
Published-26 Aug, 2025 | 06:10
Updated-26 Aug, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
egOS WebGUI Hard-Coded JWT Secret Enables Authentication Bypass

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorization due to the use of hard-coded cryptographic key.

Action-Not Available
Vendor-Welotec
Product-EG400Mk2-D11101-000101EG500Mk2-C11001-000101EG503L_4GBEG503WEG802W_i7_512GB_w/o DinRailEG500Mk2-A21101-000101EG500Mk2-A11001-000201EG500Mk2-A11101-000101EG503L-GEG603L Mk2EG603W Mk2EG500Mk2-A11001-000101EG602LEG804W ProEG503LEG500Mk2-B11101-000101EG500Mk2-C11101-000101EG802WEG503W_4GBEG500Mk2-B11001-000101EG602WEG500Mk2-A12011-000101EG400Mk2-D11001-000101EG804WEG802W_i7_512GB_DinRail
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2025-34215
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.4||CRITICAL
EPSS-1.48% / 81.07%
||
7 Day CHG+0.39%
Published-29 Sep, 2025 | 20:43
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Unauthenticated Firmware Update Endpoint RCE

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (only VA deployments) expose an unauthenticated firmware-upload flow: a public page returns a signed token usable at va-api/v1/update, and every Docker image contains the appliance’s private GPG key and hard-coded passphrase. An attacker who extracts the key and obtains a token can decrypt, modify, re-sign, upload, and trigger malicious firmware, gaining remote code execution. This vulnerability has been identified by the vendor as: V-2024-020 — Remote Code Execution.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2025-27674
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 66.50%
||
7 Day CHG~0.00%
Published-05 Mar, 2025 | 00:00
Updated-03 Nov, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Hardcoded IdP Key V-2023-006.

Action-Not Available
Vendor-printerlogicn/a
Product-vasion_printvirtual_appliancen/a
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2021-27389
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.18%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 20:42
Updated-03 Aug, 2024 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Opcenter Quality (All versions < V12.2), QMS Automotive (All versions < V12.30). A private sign key is shipped with the product without adequate protection.

Action-Not Available
Vendor-Siemens AG
Product-opcenter_qualityqms_automotiveQMS AutomotiveOpcenter Quality
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2021-22644
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.93%
||
7 Day CHG~0.00%
Published-28 Jul, 2022 | 14:19
Updated-17 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ovarro TBox Use of Hard-coded Cryptographic Key

Ovarro TBox TWinSoft uses the custom hardcoded user “TWinSoft” with a hardcoded key.

Action-Not Available
Vendor-ovarroOvarro
Product-tbox_ms-cpu32_firmwaretbox_ms-cpu32-s2_firmwaretbox_tg2tbox_lt2-530_firmwaretbox_lt2-532_firmwaretbox_lt2-540_firmwaretbox_rm2tbox_ms-cpu32-s2tbox_lt2-540tbox_lt2-532tbox_lt2-530tbox_ms-cpu32twinsofttbox_tg2_firmwaretbox_rm2_firmwareTBox
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-2413
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-2.90% / 86.42%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 02:51
Updated-17 Mar, 2026 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intumit SmartRobot - Use of Hard-coded Cryptographic Key

Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this key to encrypt a string composed of the user's name and timestamp to generate an authentication code. With this authentication code, they can obtain administrator privileges and subsequently execute arbitrary code on the remote server using built-in system functionality.

Action-Not Available
Vendor-intumitIntumitintumit
Product-smartrobotSmartRobotsmartrobot
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2021-0266
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.1||HIGH
EPSS-0.41% / 61.18%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 19:37
Updated-17 Sep, 2024 | 03:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
cSRX: Use of Hard-coded Cryptographic Keys allows an attacker to take control of the device through device management services.

The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Junos OS on cSRX Series: All versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prior to 20.4R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junoscsrxJunos OS
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-6990
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 34.46%
||
7 Day CHG~0.00%
Published-16 Mar, 2020 | 15:39
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.

Action-Not Available
Vendor-n/aRockwell Automation, Inc.
Product-micrologix_1400_a_firmwaremicrologix_1100rslogix_500micrologix_1100_firmwaremicrologix_1400micrologix_1400_b_firmwareRockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-2641
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 53.15%
||
7 Day CHG~0.00%
Published-12 Dec, 2022 | 01:49
Updated-16 Apr, 2025 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Horner Automation’s RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition.

Action-Not Available
Vendor-hornerautomationHorner Automation
Product-rcc972_firmwarercc972Remote Compact Controller (RCC) 972
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2022-34442
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-8||HIGH
EPSS-0.18% / 38.77%
||
7 Day CHG~0.00%
Published-18 Jan, 2023 | 06:54
Updated-20 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability.  An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain LDAP user privileges.

Action-Not Available
Vendor-Dell Inc.
Product-policy_manager_for_secure_connect_gatewaySecure Connect Gateway (SCG) Policy Manager
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-34441
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-8||HIGH
EPSS-0.18% / 38.77%
||
7 Day CHG~0.00%
Published-11 Jan, 2023 | 09:03
Updated-20 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability. An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain admin privileges.

Action-Not Available
Vendor-Dell Inc.
Product-policy_manager_for_secure_connect_gatewaySecure Connect Gateway (SCG) Policy Manager
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-34440
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-8.4||HIGH
EPSS-0.18% / 38.77%
||
7 Day CHG~0.00%
Published-11 Jan, 2023 | 08:23
Updated-20 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability. An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain admin privileges.

Action-Not Available
Vendor-Dell Inc.
Product-policy_manager_for_secure_connect_gatewaySecure Connect Gateway (SCG) Policy Manager
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-34256
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.21% / 42.90%
||
7 Day CHG-0.11%
Published-05 Dec, 2025 | 17:18
Updated-15 Apr, 2026 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Advantech WISE-DeviceOn Server < 5.4 Hard-coded JWT Key Authentication Bypass

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.

Action-Not Available
Vendor-Advantech Co., Ltd.Advantech (Advantech Co., Ltd.)
Product-wise-deviceon_serverWISE-DeviceOn Server
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2025-30406
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9||CRITICAL
EPSS-83.40% / 99.28%
||
7 Day CHG~0.00%
Published-03 Apr, 2025 | 00:00
Updated-05 Nov, 2025 | 19:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-04-29||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\web.config.

Action-Not Available
Vendor-gladinetGladinetGladinet
Product-centrestackCentreStackCentreStack
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-34217
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.17% / 38.17%
||
7 Day CHG-0.01%
Published-30 Sep, 2025 | 13:03
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Undocumented Hardcoded SSH Key

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) contain an undocumented 'printerlogic' user with a hardcoded SSH public key in '~/.ssh/authorized_keys' and a sudoers rule granting the printerlogic_ssh group 'NOPASSWD: ALL'. Possession of the matching private key gives an attacker root access to the appliance.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
  • Previous
  • 1
  • 2
  • Next
Details not found