CVE-2025-54471
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-30

Last updated on: 2025-10-30

Assigner: SUSE

Description
NeuVector used a hard-coded cryptographic key embedded in the source code. At compilation time, the key value was replaced with the secret key value and used to encrypt sensitive configurations when NeuVector stores the data.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-30
Last Modified
2025-10-30
Generated
2026-05-07
AI Q&A
2025-10-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
neuvector neuvector 5.4.7
neuvector neuvector *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-321 The product uses a hard-coded, unchangeable cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

NeuVector contains a vulnerability where a hard-coded cryptographic key is embedded in its source code. During compilation, this key is replaced with a secret key value that is used to encrypt sensitive configuration data stored by NeuVector. This practice can expose the encryption key, potentially allowing attackers to decrypt sensitive information.


How can this vulnerability impact me? :

This vulnerability can impact you by exposing sensitive configuration data if an attacker obtains the hard-coded cryptographic key. Since the key is embedded and reused, it can lead to unauthorized access to encrypted data, compromising confidentiality and potentially leading to data breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart