CWE-1394

Use of Default Cryptographic Key

9 CVEs Avg CVSS 6.6 MITRE
4
CRITICAL
0
HIGH
3
MEDIUM
2
LOW
1
POC
0
KEV

Monthly

CVE-2026-20709 MEDIUM This Month

Use of a default cryptographic key in Intel Pentium Processor Silver Series, Celeron Processor J Series, and Celeron Processor N Series hardware allows privilege escalation when a hardware reverse engineer with privileged user access performs a high-complexity physical attack with special internal knowledge. The vulnerability has a CVSS score of 5.8 with physical attack vector (AV:P) and high attack complexity (AC:H), requiring privileged access (PR:H) and special attack time requirements (AT:P). No public exploit code or active CISA KEV designation has been identified.

Intel Privilege Escalation
NVD VulDB
CVSS 4.0
5.8
EPSS
0.0%
CVE-2026-2215 LOW Monitor

A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult...

Information Disclosure
NVD VulDB
CVSS 3.1
3.7
EPSS
0.0%
CVE-2026-25815 LOW Monitor

Fortinet FortiOS versions up to 7.6.6 contains a vulnerability that allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in t (CVSS 3.2).

Fortinet Fortigate Ldap
NVD
CVSS 3.1
3.2
EPSS
0.0%
CVE-2025-41744 CRITICAL Act Now

CVE-2025-41744 is a security vulnerability (CVSS 9.1) that allows an unprivileged remote attacker. Critical severity with potential for significant impact on affected systems.

Information Disclosure Sprecon E T3 Firmware Sprecon E P Firmware Sprecon E C Firmware
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-41742 CRITICAL Act Now

CVE-2025-41742 is a security vulnerability (CVSS 9.8) that allows the attacker. Critical severity with potential for significant impact on affected systems.

Authentication Bypass Sprecon E C Firmware Sprecon E T3 Firmware Sprecon E P Firmware
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-55049 CRITICAL This Week

Use of Default Cryptographic Key (CWE-1394). Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-44954 CRITICAL This Week

RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build has a hardcoded SSH private key for a root-equivalent user account. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Ruckus Smartzone Firmware
NVD
CVSS 3.1
9.0
EPSS
0.1%
CVE-2025-1688 MEDIUM This Month

Milestone Systems has discovered a security vulnerability in Milestone XProtect installer that resets system configuration password after the upgrading from older versions using specific installers. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable. No vendor patch available.

Information Disclosure
NVD
CVSS 4.0
5.5
EPSS
0.2%
CVE-2025-26849 MEDIUM POC This Month

There is a Hard-coded Cryptographic Key in Docusnap 13.0.1440.24261, and earlier and later versions. Rated medium severity (CVSS 4.3), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Docusnap
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-20709
EPSS 0% CVSS 5.8
MEDIUM This Month

Use of a default cryptographic key in Intel Pentium Processor Silver Series, Celeron Processor J Series, and Celeron Processor N Series hardware allows privilege escalation when a hardware reverse engineer with privileged user access performs a high-complexity physical attack with special internal knowledge. The vulnerability has a CVSS score of 5.8 with physical attack vector (AV:P) and high attack complexity (AC:H), requiring privileged access (PR:H) and special attack time requirements (AT:P). No public exploit code or active CISA KEV designation has been identified.

Intel Privilege Escalation
NVD VulDB
CVE-2026-2215
EPSS 0% CVSS 3.7
LOW Monitor

A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult...

Information Disclosure
NVD VulDB
CVE-2026-25815
EPSS 0% CVSS 3.2
LOW Monitor

Fortinet FortiOS versions up to 7.6.6 contains a vulnerability that allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in t (CVSS 3.2).

Fortinet Fortigate Ldap
NVD
CVE-2025-41744
EPSS 0% CVSS 9.1
CRITICAL Act Now

CVE-2025-41744 is a security vulnerability (CVSS 9.1) that allows an unprivileged remote attacker. Critical severity with potential for significant impact on affected systems.

Information Disclosure Sprecon E T3 Firmware Sprecon E P Firmware +1
NVD
CVE-2025-41742
EPSS 0% CVSS 9.8
CRITICAL Act Now

CVE-2025-41742 is a security vulnerability (CVSS 9.8) that allows the attacker. Critical severity with potential for significant impact on affected systems.

Authentication Bypass Sprecon E C Firmware Sprecon E T3 Firmware +1
NVD
CVE-2025-55049
EPSS 0% CVSS 9.1
CRITICAL This Week

Use of Default Cryptographic Key (CWE-1394). Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD
CVE-2025-44954
EPSS 0% CVSS 9.0
CRITICAL This Week

RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build has a hardcoded SSH private key for a root-equivalent user account. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Ruckus Smartzone Firmware
NVD
CVE-2025-1688
EPSS 0% CVSS 5.5
MEDIUM This Month

Milestone Systems has discovered a security vulnerability in Milestone XProtect installer that resets system configuration password after the upgrading from older versions using specific installers. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable. No vendor patch available.

Information Disclosure
NVD
CVE-2025-26849
EPSS 0% CVSS 4.3
MEDIUM POC This Month

There is a Hard-coded Cryptographic Key in Docusnap 13.0.1440.24261, and earlier and later versions. Rated medium severity (CVSS 4.3), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Docusnap
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy