CVE-2026-22906
Unknown · Unspecified Product (Configuration Management)
User credentials are stored using weak AES-ECB encryption with a hardcoded key, allowing unauthenticated attackers to recover plaintext passwords.
Executive summary
The use of hardcoded keys and weak AES-ECB encryption for credential storage allows unauthenticated attackers to decrypt and recover administrative usernames and passwords.
Vulnerability
The affected software stores user credentials in a configuration file using AES-ECB encryption with a hardcoded cryptographic key. An unauthenticated remote attacker who obtains the configuration file can easily decrypt the contents to recover plaintext usernames and passwords.
Business impact
This vulnerability facilitates full administrative takeover of the affected system. When combined with other flaws like authentication bypass, it allows an attacker to gain permanent access to the device. The CVSS score of 9.8 highlights the critical risk of total identity and access management failure.
Remediation
Immediate Action: Update the software to a version that implements secure credential hashing (e.g., Argon2 or bcrypt) and removes hardcoded keys.
Proactive Monitoring: Monitor for unauthorized access to configuration files and review administrative login logs for anomalous activity.
Compensating Controls: Ensure that configuration files are not accessible via the web root and implement strict file system permissions to prevent unauthorized reads.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The reliance on hardcoded keys for credential storage is a high-severity design flaw. It is imperative that administrators apply the vendor's update immediately and rotate all administrative passwords once the patch has been successfully deployed.