2024-02-20 21:00:35 +00:00

24 lines
840 B
JSON

{
"id": "CVE-2022-48625",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-20T00:15:14.393",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Yealink Config Encrypt Tool add RSA before 1.2 has a built-in RSA key pair, and thus there is a risk of decryption by an adversary."
},
{
"lang": "es",
"value": "Yealink Config Encrypt Tool agrega RSA anterior a 1.2 tiene un par de claves RSA incorporado y, por lo tanto, existe el riesgo de que un adversario lo descifre."
}
],
"metrics": {},
"references": [
{
"url": "https://www.yealink.com/en/trust-center/security-advisories/yealink-config-encrypt-tool-hardcoded-encryption-password-vulnerability",
"source": "cve@mitre.org"
}
]
}