CVE-2025-52268
BaseFortify
Publication date: 2025-10-27
Last updated on: 2025-10-30
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| starcharge | artemis_ac_charger | 1.0.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in StarCharge Artemis AC Charger 7-22 kW v1.0.4 is due to a hardcoded AES key. This means that the encryption key used for securing login tokens is embedded directly in the software and cannot be changed. Attackers who discover this key can forge or decrypt valid login tokens, potentially gaining unauthorized access.
How can this vulnerability impact me? :
This vulnerability can allow attackers to create or decrypt valid login tokens, which could lead to unauthorized access to the charger system. This may result in unauthorized control or manipulation of the charging device, potentially causing operational disruptions or security breaches.