Vulnerabilities (CVE)

Filtered by CWE-798
Total 1447 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-6693 1 Fortinet 1 Fortios 2025-06-26 4.0 MEDIUM 6.5 MEDIUM
Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).
CVE-2025-4378 2025-06-26 N/A 10.0 CRITICAL
Cleartext Transmission of Sensitive Information, Use of Hard-coded Credentials vulnerability in Ataturk University ATA-AOF Mobile Application allows Authentication Abuse, Authentication Bypass.This issue affects ATA-AOF Mobile Application: before 20.06.2025.
CVE-2025-20188 1 Cisco 1 Ios Xe 2025-06-23 N/A 10.0 CRITICAL
A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.
CVE-2025-48748 1 Netwrix 1 Directory Manager 2025-06-23 N/A 10.0 CRITICAL
Netwrix Directory Manager (formerly Imanami GroupID) through v.10.0.7784.0 has a hard-coded password.
CVE-2024-22853 1 Dlink 2 Go-rt-ac750, Go-rt-ac750 Firmware 2025-06-20 N/A 9.8 CRITICAL
D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.
CVE-2024-24324 1 Totolink 2 A8000ru, A8000ru Firmware 2025-06-20 N/A 9.8 CRITICAL
TOTOLINK A8000RU v7.1cu.643_B20200521 was discovered to contain a hardcoded password for root stored in /etc/shadow.
CVE-2023-49256 1 Hongdian 2 H8951-4g-esp, H8951-4g-esp Firmware 2025-06-20 N/A 7.5 HIGH
It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.
CVE-2023-49253 1 Hongdian 2 H8951-4g-esp, H8951-4g-esp Firmware 2025-06-20 N/A 9.8 CRITICAL
Root user password is hardcoded into the device and cannot be changed in the user interface.
CVE-2025-32888 1 Gotenna 3 Gotenna, Mesh, Mesh Firmware 2025-06-20 N/A 7.3 HIGH
An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The verification token used for sending SMS through a goTenna server is hardcoded in the app.
CVE-2025-32889 1 Gotenna 3 Gotenna, Mesh, Mesh Firmware 2025-06-20 N/A 7.3 HIGH
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The verification token used for sending SMS through a goTenna server is hardcoded in the app.
CVE-2024-20280 1 Cisco 1 Ucs Central Software 2025-06-18 N/A 6.3 MEDIUM
A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key.
CVE-2023-39458 1 Trianglemicroworks 1 Scada Data Gateway 2025-06-17 N/A 5.3 MEDIUM
Triangle MicroWorks SCADA Data Gateway Use of Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. The service uses a hard-coded default SSL certificate. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20509.
CVE-2025-28388 1 Openc3 1 Cosmos 2025-06-17 N/A 9.8 CRITICAL
OpenC3 COSMOS v6.0.0 was discovered to contain hardcoded credentials for the Service Account.
CVE-2023-50974 1 Appwrite 1 Command Line Interface 2025-06-17 N/A 5.5 MEDIUM
In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwrite user are stored in a ~/.appwrite/prefs.json file with 0644 as UNIX permissions. Any user of the local system can access those credentials.
CVE-2025-35940 2025-06-12 N/A 8.1 HIGH
The ArchiverSpaApi ASP.NET application uses a hard-coded JWT signing key. An unauthenticated remote attacker can generate and use a verifiable JWT token to access protected ArchiverSpaApi URL endpoints.
CVE-2024-50564 1 Fortinet 1 Forticlient 2025-06-11 N/A 3.3 LOW
A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
CVE-2025-36572 1 Dell 12 Powerstore 1000t, Powerstore 1200t, Powerstore 3000t and 9 more 2025-06-09 N/A 6.5 MEDIUM
Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of Hard-coded Credentials vulnerability in the PowerStore image file. A low privileged attacker with remote access, with the knowledge of the hard-coded credentials, could potentially exploit this vulnerability to gain unauthorized access based on the hardcoded account's privileges.
CVE-2025-5751 2025-06-09 N/A 4.6 MEDIUM
WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of management cards. The issue results from the lack of personalization of management cards. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26292.
CVE-2025-3321 2025-06-06 N/A N/A
A predefined administrative account is not documented and cannot be deactivated. This account cannot be misused from the network, only by local users on the server.
CVE-2024-23453 1 Spooncast 1 Spoon 2025-06-04 N/A 5.5 MEDIUM
Android Spoon application version 7.11.1 to 8.6.0 uses hard-coded credentials, which may allow a local attacker to retrieve the hard-coded API key when the application binary is reverse-engineered. This API key may be used for unexpected access of the associated service.