A low privileged local attacker can abuse the affected service by using a hardcoded cryptographic key.
Weakness
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
Potential Mitigations
References