CVE-2025-54471
BaseFortify
Publication date: 2025-10-30
Last updated on: 2025-10-30
Assigner: SUSE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| neuvector | neuvector | 5.4.7 |
| neuvector | neuvector | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
NeuVector contains a vulnerability where a hard-coded cryptographic key is embedded in its source code. During compilation, this key is replaced with a secret key value that is used to encrypt sensitive configuration data stored by NeuVector. This practice can expose the encryption key, potentially allowing attackers to decrypt sensitive information.
How can this vulnerability impact me? :
This vulnerability can impact you by exposing sensitive configuration data if an attacker obtains the hard-coded cryptographic key. Since the key is embedded and reused, it can lead to unauthorized access to encrypted data, compromising confidentiality and potentially leading to data breaches.