Our new Biannual ICS Risk & Vulnerability Report is the most up-to-date look at CVEs disclosed in OT devices.
Check it out!
CWE-321: USE OF HARD-CODED CRYPTOGRAPHIC KEY The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: “Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities”