CVE-2025-59407
BaseFortify
Publication date: 2025-10-02
Last updated on: 2025-10-24
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flocksafety | flock_safety | 6.35.33 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Flock Safety DetectionProcessing Android application bundling a Java Keystore file (flock_rye.bks) along with its hardcoded password (flockhibiki17) in the application code. The keystore contains a private key, which could be extracted by an attacker due to the hardcoded password being exposed in the code.
How can this vulnerability impact me? :
If an attacker obtains the hardcoded password and accesses the private key in the keystore, they could potentially misuse the key for unauthorized actions such as impersonation, data decryption, or compromising the security of the devices using this application.