CVE Vulnerabilities

CVE-2025-54807

Use of Hard-coded Cryptographic Key

Published: Sep 18, 2025 | Modified: Sep 18, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access to the system.

Weakness

The product uses a hard-coded, unchangeable cryptographic key.

Potential Mitigations

References