CVE-2026-5455
Received Received - Intake
Hardcoded Cryptographic Key Vulnerability in Dialogue App Android

Publication date: 2026-04-03

Last updated on: 2026-04-03

Assigner: VulDB

Description
A vulnerability was determined in Dialogue App up to 4.3.2 on Android. The affected element is an unknown function of the file file res/raw/config.json of the component ca.diagram.dialogue. Executing a manipulation of the argument SEGMENT_WRITE_KEY can lead to use of hard-coded cryptographic key . The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-03
Generated
2026-05-06
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dialogue_app dialogue_app to 4.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-320 Key Management Errors
CWE-321 The product uses a hard-coded, unchangeable cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Dialogue App up to version 4.3.2 on Android. It involves an unknown function within the file res/raw/config.json of the component ca.diagram.dialogue. By manipulating the argument SEGMENT_WRITE_KEY, an attacker can cause the application to use a hard-coded cryptographic key.

The attack can only be performed locally, meaning the attacker needs local access to the device. The vulnerability has been publicly disclosed and could potentially be exploited.


How can this vulnerability impact me? :

The impact of this vulnerability is limited due to its low CVSS scores and the requirement for local access. However, the use of a hard-coded cryptographic key can weaken the security of the application by making cryptographic operations predictable or vulnerable to key extraction.

This could potentially allow an attacker with local access to compromise the confidentiality of certain data protected by the cryptographic key, but it does not affect integrity or availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart