CVE Vulnerabilities

CVE-2025-2810

Use of Hard-coded Cryptographic Key

Published: Aug 05, 2025 | Modified: Aug 05, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A low privileged local attacker can abuse the affected service by using a hardcoded cryptographic key.

Weakness

The product uses a hard-coded, unchangeable cryptographic key.

Potential Mitigations

References