CWE-321

High likelihood

Use of Hard-coded Cryptographic Key

Parent: CWE-798 - Use of Hard-coded Credentials

The product uses a hard-coded, unchangeable cryptographic key.

276 vulnerabilities with CWE-321
CVE-2025-44963 CRITICAL
RUCKUS Network Director <4.5 - Auth Bypass
CVSS 9.0
CVE-2025-29630 MEDIUM
Gardyn 4 - RCE
CVSS 6.6
CVE-2025-43483 MEDIUM
Poly Clariti Manager <10.12.1 - Info Disclosure
CVSS 5.7
CVE-2025-52374 MEDIUM
hMailServer <5.8.6, <5.6.9-beta - Info Disclosure
CVSS 4.6
CVE-2025-52373 MEDIUM
hMailServer <5.8.6, 5.6.9-beta - Info Disclosure
CVSS 4.6
CVE-2025-6074 MEDIUM
ABB RMC-100, ABB RMC-100 LITE - Auth Bypass
CVSS 6.5
CVE-2025-6071 MEDIUM
ABB RMC-100, ABB RMC-100 LITE - Info Disclosure
CVSS 5.3
CVE-2025-6669 LOW
gooaclok819 sublinkX <1.8 - Code Injection
CVSS 3.7
CVE-2025-5353 HIGH
Ivanti Workspace Control <10.19.10.0 - Info Disclosure
CVSS 8.8
CVE-2025-22463 HIGH
Ivanti Workspace Control <10.19.10.0 - Info Disclosure
CVSS 7.3
CVE-2025-22455 HIGH
Ivanti Workspace Control <10.19.0.0 - Privilege Escalation
CVSS 8.8
CVE-2025-49164 MEDIUM
Arris VIP1113 - Info Disclosure
CVSS 4.3
CVE-2025-5164 LOW
PerfreeBlog 4.0.11 - Code Injection
CVSS 3.7
CVE-2025-48417 MEDIUM
Firmware - Man-in-the-Middle Attack
CVSS 6.5
CVE-2025-4876 MEDIUM
ConnectWise Risk Assessment - Info Disclosure
CVSS 6.0
CVE-2025-45746 MEDIUM
ZKT ZKBio CVSecurity 6.4.1_R - Auth Bypass
CVSS 6.5
CVE-2025-32730 MEDIUM
i-PRO Configuration Tool - Auth Bypass
CVSS 5.5
CVE-2025-30206 CRITICAL
Dpanel - Auth Bypass
CVSS 9.8
CVE-2025-31362 LOW
BizRobo! - Info Disclosure
CVSS 3.7
CVE-2025-3177 MEDIUM
FastCMS 0.1.5 - Code Injection
CVSS 5.0
CVE-2025-30406 CRITICAL KEV
Gladinet CentreStack < 16.4.10315.56368 Use of Hard-coded Key Leads to Unauthenticated RCE
CVSS 9.0
CVE-2025-30095 CRITICAL
VyOS <1.4.2 - Info Disclosure
CVSS 9.0
CVE-2025-30234 HIGH
SmartOS - Info Disclosure
CVSS 8.3
CVE-2025-27674 CRITICAL
Vasion Print <22.0.843 - Hardcoded IdP Key
CVSS 9.8
CVE-2025-26340 HIGH
Q-Free MaxTime <= 2.11.0 - Auth Bypass
CVSS 8.8
Details
Vulnerabilities 276
Exploit Likelihood High