CVE-2025-43483
BaseFortify
Publication date: 2025-07-23
Last updated on: 2025-10-02
Assigner: HP Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hp | poly_clariti_manager | to 10.12.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Poly Clariti Manager versions prior to 10.12.1 allows an attacker to potentially retrieve hardcoded cryptographic keys, which could compromise the security of encrypted data or communications.
How can this vulnerability impact me? :
If exploited, this vulnerability could lead to unauthorized access to cryptographic keys, potentially allowing attackers to decrypt sensitive information or impersonate legitimate users, thereby compromising system security.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Poly Clariti Manager software to version 10.12.1 or later, as HP has addressed the issue in this latest software update.