An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.
History

Tue, 10 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.
Title Use of a Broken or Risky Cryptographic Algorithm for firmware images of power analyzer
Weaknesses CWE-327
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2026-03-10T08:26:48.759Z

Updated: 2026-03-10T08:26:48.759Z

Reserved: 2025-04-16T11:17:48.311Z

Link: CVE-2025-41711

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.