CVE Vulnerabilities

CVE-2025-34256

Use of Hard-coded Cryptographic Key

Published: Dec 05, 2025 | Modified: Dec 11, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.

Weakness

The product uses a hard-coded, unchangeable cryptographic key.

Affected Software

Name Vendor Start Version End Version
Wise-deviceon_server Advantech * 5.4 (excluding)

Potential Mitigations

References