CWE-798: CWE-798
Yearly Trend
Top Affected Vendors
All CWE-798 CVEs (456)
This vulnerability allows attackers with administrative privileges on the Trellix ePolicy Orchestrator server to access the database encryption key by...
May 16, 2024Unauthenticated attackers on the same network can use SSH private keys to perform actions on LoadMaster HA/Cluster machines by knowing their IP addres...
May 2, 2024CVE-2024-29966 is a vulnerability in Brocade SANnav OVA appliances where hard-coded root credentials are documented, allowing unauthenticated attacker...
Apr 19, 2024The Elink Smart eSmartCam Android app version 2.1.5 contains hardcoded AES encryption keys in its binary, allowing attackers who can intercept network...
Mar 5, 2024This vulnerability allows attackers to access sensitive data in Comarch ERP XL databases using a hard-coded password that's identical across all insta...
Feb 15, 2024CVE-2023-37608 is a hardcoded credential vulnerability in Automatic Systems SOC FL9600 FirstLane devices that allows remote attackers to gain super ad...
Jan 3, 2024CVE-2023-36647 is a critical authentication bypass vulnerability in ProLion CryptoSpike where a hard-coded private key allows attackers to forge JWT t...
Dec 12, 2023Archery v1.10.0 uses predictable initialization vectors (IVs) for AES-CBC encryption, allowing attackers to decrypt sensitive data without the encrypt...
Nov 16, 2023SuperAGI v0.0.13 uses a hardcoded encryption key, making all encrypted data vulnerable to decryption by attackers. This affects anyone using this vers...
Nov 16, 2023CVE-2023-5318 involves hard-coded credentials in Microweber CMS versions before 2.0, allowing attackers to gain unauthorized access to affected system...
Sep 30, 2023This vulnerability allows attackers with access to backup or configuration files to decrypt sensitive information using a hard-coded cryptographic key...
Aug 11, 2023Fujitsu Real-time Video Transmission Gear 'IP series' devices contain hard-coded credentials that allow remote unauthenticated attackers to initialize...
Jul 26, 2023Sage 300's optional Web Screens feature uses a hard-coded encryption key to protect database credentials, allowing attackers who can access the config...
Apr 28, 2023This vulnerability allows unauthorized access to the RTSP video feed of TP-Link Tapo C310 cameras by using hardcoded credentials (User: ---, Password:...
Apr 16, 2023This vulnerability involves Ovarro TBox TWinSoft software using a hardcoded user account 'TWinSoft' with a static, predictable key. Attackers can expl...
Jul 28, 2022FileWave versions before 14.6.3 and 14.7.x before 14.7.2 use a hard-coded cryptographic key, allowing unauthenticated attackers to decrypt sensitive i...
Jul 25, 2022IBM Security Verify Information Queue 10.0.2 contains hard-coded credentials that could allow attackers to authenticate to the system, communicate wit...
Jul 25, 2022This vulnerability allows attackers to bypass authentication on Verizon 5G Home LVSKIHP devices by extracting static certificates embedded in the firm...
Jul 14, 2022IBM QRadar Network Security versions 5.4.0 and 5.5.0 contain hard-coded credentials that could allow attackers to authenticate to the system, communic...
Jul 12, 2022CVE-2022-23942 is a vulnerability in Apache Doris where hardcoded cryptographic keys and initialization vectors (IVs) were used for encrypting LDAP pa...
Apr 26, 2022RunAsSpc 4.0 uses a hardcoded encryption key that can be recovered by attackers. This allows anyone with access to encrypted credential files to decry...
Mar 16, 2022CVE-2021-46247 is a hard-coded cryptographic key vulnerability in ASUS CMAX6000 routers that allows attackers to decrypt encrypted data. This affects ...
Feb 17, 2022CVE-2022-22722 is a hard-coded SSH cryptographic key vulnerability in Schneider Electric Easergy P5 protection relays. Attackers who obtain the key an...
Feb 4, 2022Apache Kylin's PasswordPlaceholderConfigurer uses hardcoded encryption keys and initialization vectors, making encrypted passwords easily decryptable ...
Jan 6, 2022This vulnerability involves hard-coded cryptographic keys in FortiOS SSLVPN that could be extracted through reverse engineering. Attackers could poten...
Dec 8, 2021Zoho ManageEngine Remote Access Plus versions before 10.1.2121.1 contain hardcoded credentials in resetPWD.xml, allowing attackers to bypass authentic...
Sep 30, 2021This vulnerability in OnyakTech Comments Pro 3.8 allows attackers to spoof user identities in comment systems. By decompiling the installer to discove...
Sep 7, 2021This vulnerability involves hard-coded API keys in the Retty mobile app, allowing attackers to extract credentials for external services by analyzing ...
Jul 14, 2021EDIMAX wireless network cameras have a hard-coded default administrator account and password in their firmware. Remote attackers can extract these cre...
Apr 27, 2021This vulnerability in Xiaomi routers allows attackers to decrypt backup files containing sensitive user information like passwords due to hard-coded e...
Apr 8, 2021Athom Homey and Homey Pro devices use a static, well-known ZigBee network key instead of generating unique keys, allowing attackers to decrypt and pot...
Mar 9, 2021IBM Security Verify Bridge contains hard-coded credentials that could allow attackers to authenticate to the system, communicate with external compone...
Mar 3, 2021ThinkAdmin v6 has hardcoded default administrator credentials that allow attackers to gain full administrative dashboard access. This affects all inst...
Mar 3, 2021This vulnerability allows attackers to take over AD-only accounts in Zoho Analytics products due to a hardcoded sensitive token. It affects on-premise...
Mar 17, 2025Toshiba printers store WebDAV access credentials in readable files, allowing attackers to gain full WebDAV access to affected printers. This affects a...
Jun 14, 2024This vulnerability in TIBCO Hawk components allows attackers with access to log files to extract credentials used for EMS server authentication. Affec...
Oct 25, 2023CVE-2023-45226 involves hardcoded credentials in F5 BIG-IP SPK TMM debug containers that could allow attackers to impersonate SSH servers when SSH deb...
Oct 10, 2023EdgeConnect SD-WAN Orchestrator instances use shared static SSH host keys across all installations, allowing attackers to spoof legitimate Orchestrato...
Aug 22, 2023This vulnerability allows attackers to activate tethering mode on Meeting Owl devices using hard-coded credentials, potentially enabling unauthorized ...
Jun 2, 2022NMIS/BioDose software versions V22.02 and earlier contain hard-coded plain text passwords in executable binaries, allowing attackers to bypass authent...
Dec 2, 2025This vulnerability allows attackers to send SMS messages through goTenna servers without authorization by using a hardcoded verification token in the ...
May 1, 2025The GoodWe GW1500-XS inverter contains hard-coded Wi-Fi credentials that allow anyone within physical proximity to connect to the device's Wi-Fi netwo...
Feb 14, 2025CVE-2024-8005 is a critical authentication bypass vulnerability in demozx gf_cms versions 1.0 and 1.0.1 that allows attackers to gain unauthorized acc...
Aug 20, 2024CVE-2024-29063 is an information disclosure vulnerability in Azure AI Search that could allow unauthorized access to sensitive data. This affects Azur...
Apr 9, 2024ASUS WebStorage contains a hardcoded API token in its source code, allowing unauthenticated remote attackers to connect to the server and attempt logi...
Apr 22, 2022Taiwan Secom Dr.ID Access Control system's login page contains hard-coded credentials in source code, allowing unauthenticated remote attackers to acc...
Apr 7, 2022This vulnerability involves undocumented password-protected FTP access to the root directory in certain Phoenix Contact AXL F BK and IL BK devices. At...
Jun 25, 2021This vulnerability allows remote attackers to execute arbitrary code on GE Reason RPV311 14A03 devices without authentication. The firmware contains h...
Jun 16, 2021CVE-2023-36651 is a critical authentication bypass vulnerability in ProLion CryptoSpike 3.0.15P2 where hard-coded super-admin credentials allow remote...
Dec 12, 2023Technicolor TG670 10.5.N.9 devices contain hard-coded administrative credentials that allow remote attackers to gain full control over the device when...
Sep 19, 2023About CWE-798 (CWE-798)
Our database tracks 456 CVEs classified as CWE-798, with 262 rated critical and 146 rated high severity. The average CVSS score for CWE-798 vulnerabilities is 8.8.
External reference: View CWE-798 on MITRE CWE →
Monitor CWE-798 Vulnerabilities
Get alerted when new CWE-798 CVEs affect your infrastructure.
Start Monitoring Free