{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T02:41:40.700","vulnerabilities":[{"cve":{"id":"CVE-2025-4876","sourceIdentifier":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","published":"2025-05-19T16:15:35.107","lastModified":"2025-10-02T01:42:14.220","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"ConnectWise-Password-Encryption-Utility.exe in ConnectWise Risk Assessment allows an attacker to extract a hardcoded AES decryption key via reverse engineering. This key is embedded in plaintext within the binary and used in cryptographic operations without dynamic key management. Once obtained the key can be used to decrypt CSV input files used for authenticated network scanning."},{"lang":"es","value":"ConnectWise-Password-Encryption-Utility.exe, en la Evaluación de Riesgos de ConnectWise, permite a un atacante extraer una clave de descifrado AES codificada mediante ingeniería inversa. Esta clave se incrusta en texto plano dentro del binario y se utiliza en operaciones criptográficas sin gestión dinámica de claves. Una vez obtenida, la clave puede utilizarse para descifrar archivos CSV de entrada utilizados para el escaneo de red autenticado."}],"metrics":{"cvssMetricV31":[{"source":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.5,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":3.6}]},"weaknesses":[{"source":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","type":"Secondary","description":[{"lang":"en","value":"CWE-321"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:connectwise:risk_assessment:*:*:*:*:*:*:*:*","versionEndExcluding":"2023-07-01","matchCriteriaId":"F16CBD69-2DC0-4D6E-8A30-A7A27700F61B"}]}]}],"references":[{"url":"https://github.com/packetlabs/vulnerability-advisory/blob/main/Disclosures/PL-2025-11315/README.md","source":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","tags":["Third Party Advisory"]}]}}]}