First published: Thu Mar 27 2025(Updated: )
The use of a weak cryptographic key pair in the signature verification process in WPS Office (Kingsoft) on Windows allows an attacker who successfully recovered the private key to sign components. As older versions of WPS Office did not validate the update server's certificate, an Adversary-In-The-Middle attack was possible allowing updates to be hijacked.
Credit: security@eset.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPS Office |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2516 is considered a high severity vulnerability due to its potential for exploitation through weak cryptographic key management.
CVE-2025-2516 affects WPS Office users by allowing attackers to sign malicious components if they recover the private key from the weak cryptographic key pair.
To mitigate CVE-2025-2516, users should update to the latest version of WPS Office which addresses the weak cryptographic key issue.
Yes, a patch for CVE-2025-2516 is available in the latest updates of WPS Office that strengthens the signature verification process.
CVE-2025-2516 affects older versions of WPS Office on Windows that utilize weak cryptographic practices.