CVE-2025-4876

ConnectWise-Password-Encryption-Utility.exe in ConnectWise Risk Assessment allows an attacker to extract a hardcoded AES decryption key via reverse engineering. This key is embedded in plaintext within the binary and used in cryptographic operations without dynamic key management. Once obtained the key can be used to decrypt CSV input files used for authenticated network scanning.
Configurations

Configuration 1 (hide)

cpe:2.3:a:connectwise:risk_assessment:*:*:*:*:*:*:*:*

History

03 Sep 2025, 17:15

Type Values Removed Values Added
CWE CWE-798 CWE-321

13 Aug 2025, 16:41

Type Values Removed Values Added
First Time Connectwise
Connectwise risk Assessment
References () https://github.com/packetlabs/vulnerability-advisory/blob/main/Disclosures/PL-2025-11315/README.md - () https://github.com/packetlabs/vulnerability-advisory/blob/main/Disclosures/PL-2025-11315/README.md - Third Party Advisory
CPE cpe:2.3:a:connectwise:risk_assessment:*:*:*:*:*:*:*:*

21 May 2025, 20:25

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-19 16:15

Updated : 2025-09-03 17:15


NVD link : CVE-2025-4876

Mitre link : CVE-2025-4876

CVE.ORG link : CVE-2025-4876


JSON object : View

Products Affected

connectwise

  • risk_assessment
CWE
CWE-321

Use of Hard-coded Cryptographic Key