CVE-2025-60250
BaseFortify
Publication date: 2025-09-26
Last updated on: 2025-09-26
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unitree | b2 | * |
| unitree | g1 | * |
| unitree | h1 | * |
| unitree | go2 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves Unitree Go2, G1, H1, and B2 devices using a fixed encryption key and initialization vector (IV) to decrypt Bluetooth Low Energy (BLE) packet data. Specifically, they use the key 'df98b715d5c6ed2b25817b6f2554124a' and the IV '2841ae97419c2973296a0d4bdfe19a4f', which can allow attackers to decrypt BLE communications.
How can this vulnerability impact me? :
Because the devices use a fixed key and IV for decrypting BLE packets, an attacker could potentially intercept and decrypt BLE communications, leading to information disclosure or unauthorized access to data transmitted over BLE.