CVE-2026-22906
Awaiting Analysis Awaiting Analysis - Queue
AES-ECB Key Exposure in Credential Storage Enables Remote Decryption

Publication date: 2026-02-09

Last updated on: 2026-02-09

Assigner: CERT VDE

Description
User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-09
Last Modified
2026-02-09
Generated
2026-05-07
AI Q&A
2026-02-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wago 852-1328 to 2.65 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-321 The product uses a hard-coded, unchangeable cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves user credentials being stored using AES-ECB encryption with a hardcoded key. Because the key is hardcoded and the encryption mode (ECB) is insecure, an unauthenticated remote attacker who obtains the configuration file can decrypt and recover plaintext usernames and passwords.

The risk is increased when this vulnerability is combined with an authentication bypass, allowing attackers easier access to the configuration file.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized access to sensitive user credentials. An attacker can decrypt usernames and passwords, potentially gaining full control over the affected system.

The CVSS score of 9.8 indicates a critical severity, meaning the vulnerability can lead to complete confidentiality, integrity, and availability compromise without requiring any privileges or user interaction.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

The vendor recommends updating to firmware version 02.65 to remediate the vulnerabilities including insecure credential storage and authentication bypass issues.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart