Логотип exploitDog
bind:CVE-2025-41722
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-41722

Количество 2

Количество 2

nvd логотип

CVE-2025-41722

4 месяца назад

The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-p5c4-4hc3-4fp5

4 месяца назад

The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-41722

The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.

CVSS3: 7.5
0%
Низкий
4 месяца назад
github логотип
GHSA-p5c4-4hc3-4fp5

The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.

CVSS3: 7.5
0%
Низкий
4 месяца назад

Уязвимостей на страницу