First published: Mon Feb 19 2024(Updated: )
Yealink Config Encrypt Tool add RSA before 1.2 has a built-in RSA key pair, and thus there is a risk of decryption by an adversary.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yealink Config Encrypt Tool add RSA | <1.2 | |
Yealink Config Encrypt Tool add RSA | <1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48625 has been classified as a high severity vulnerability due to the risk of decryption by an adversary.
To mitigate CVE-2022-48625, upgrade to Yealink Config Encrypt Tool version 1.2 or later, which eliminates the use of a built-in RSA key pair.
CVE-2022-48625 describes a vulnerability in Yealink Config Encrypt Tool that contains a hardcoded RSA key pair, allowing potential decryption by attackers.
CVE-2022-48625 affects users of the Yealink Config Encrypt Tool versions prior to 1.2.
CVE-2022-48625 is categorized as a cryptographic vulnerability due to the use of a hardcoded encryption key.