CVE-2025-58744
Hard-coded Credentials in Milner ImageDirector Capture Enables Decryption
Publication date: 2026-01-20
Last updated on: 2026-02-10
Assigner: Security Risk Advisors
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| milner | imagedirector_capture | From 7.0.9 (inc) to 7.6.3.25808 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1392 | The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. |
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the use of default or hard-coded credentials in the C2SGlobalSettings.dll component of Milner ImageDirector Capture on Windows. It allows an attacker to decrypt document archive files by using credentials that are themselves decrypted with a hard-coded application encryption key. This means that unauthorized users could potentially access sensitive archived documents due to the predictable or embedded credentials.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to encrypted document archives, potentially exposing sensitive or confidential information stored within those archives. This could result in data breaches, loss of confidentiality, and compromise of the integrity of archived documents.