CVE Vulnerabilities

CVE-2025-2810

Use of Hard-coded Cryptographic Key

Published: Aug 05, 2025 | Modified: Aug 05, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A low privileged local attacker can abuse the affected service by using a hardcoded cryptographic key.

Weakness

The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.

Potential Mitigations

References