An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access. | |
| Title | Use of a Broken or Risky Cryptographic Algorithm for firmware images of power analyzer | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published: 2026-03-10T08:26:48.759Z
Updated: 2026-03-10T08:26:48.759Z
Reserved: 2025-04-16T11:17:48.311Z
Link: CVE-2025-41711
No data.
No data.
No data.