### [CVE-2020-25193](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25193) ![](https://img.shields.io/static/v1?label=Product&message=Reason%20RT43X%20Clocks&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2008A06%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key&color=brighgreen) ### Description By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2020-25193