CVE-2025-45766
BaseFortify
Publication date: 2025-08-06
Last updated on: 2025-08-17
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pocoproject | poco | 1.14.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in poco v1.14.1-release involves the use of weak encryption, which means that the cryptographic methods used to protect data are not strong enough to prevent unauthorized access or attacks.
How can this vulnerability impact me? :
The weak encryption can lead to unauthorized disclosure or modification of sensitive data, potentially causing data breaches, loss of data integrity, and disruption of services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
Weak encryption may result in non-compliance with standards and regulations such as GDPR and HIPAA, which require strong protection of personal and sensitive data, potentially leading to legal and financial consequences.