CVE-2026-5462
Hard-Coded Cryptographic Key in Wahoo Fitness SYSTM App
Publication date: 2026-04-03
Last updated on: 2026-04-03
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wahoo_fitness | systm_app | to 7.2.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-320 | Key Management Errors |
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Wahoo Fitness SYSTM App up to version 7.2.1 on Android. It involves an unknown function in the file com/WahooFitness/SYSTM/BuildConfig.java within the component com.WahooFitness.SYSTM. The issue arises because the argument SEGMENT_WRITE_KEY is manipulated, leading to the use of a hard-coded cryptographic key. Exploiting this vulnerability requires local access to the device.
How can this vulnerability impact me? :
The impact of this vulnerability is limited due to the requirement of local access and the low severity scores (CVSS v3.1 BaseScore 3.3). The main consequence is that the use of a hard-coded cryptographic key could potentially allow an attacker with local access to compromise some confidentiality aspects of the application. However, there is no impact on integrity or availability.