CVE-2025-54807
The secret used for validating authentication tokens is hardcoded in
device firmware for affected versions. An attacker who obtains the
signing key can bypass authentication, gaining complete access to the
system.
device firmware for affected versions. An attacker who obtains the
signing key can bypass authentication, gaining complete access to the
system.
Vendor
-
Product
-
CWE
Yayın Tarihi
2025-09-18 21:15:48
Güncelleme
2025-09-19 16:00:27
Source Identifier
ics-cert@hq.dhs.gov
KEV Date Added
-