CVE-2025-4876

ConnectWise-Password-Encryption-Utility.exe in ConnectWise Risk Assessment allows an attacker to extract a hardcoded AES decryption key via reverse engineering. This key is embedded in plaintext within the binary and used in cryptographic operations without dynamic key management. Once obtained the key can be used to decrypt CSV input files used for authenticated network scanning.
Configurations

Configuration 1 (hide)

cpe:2.3:a:connectwise:risk_assessment:*:*:*:*:*:*:*:*

History

13 Aug 2025, 16:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4
CPE cpe:2.3:a:connectwise:risk_assessment:*:*:*:*:*:*:*:*
First Time Connectwise
Connectwise risk Assessment
References () https://github.com/packetlabs/vulnerability-advisory/blob/main/Disclosures/PL-2025-11315/README.md - () https://github.com/packetlabs/vulnerability-advisory/blob/main/Disclosures/PL-2025-11315/README.md - Third Party Advisory

19 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-19 16:15

Updated : 2025-08-13 16:41


NVD link : CVE-2025-4876

Mitre link : CVE-2025-4876


JSON object : View

Products Affected

connectwise

  • risk_assessment
CWE

No CWE.