Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 25 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux linux Kernel
|
|
| CPEs | cpe:2.3:a:lynxtechnology:twonky_server:8.5.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Linux linux Kernel
|
|
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Lynxtechnology Lynxtechnology twonky Server Microsoft Microsoft windows |
|
| Vendors & Products |
Linux
Linux linux Lynxtechnology Lynxtechnology twonky Server Microsoft Microsoft windows |
Wed, 19 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Twonky Server 8.5.2 on Linux and Windows is vulnerable to a cryptographic flaw, use of hard-coded cryptographic keys. An attacker with knowledge of the encrypted administrator password can decrypt the value with static keys to view the plain text password and gain administrator-level access to Twonky Server. | |
| Title | Hard-coded encryption keys in Twonky Server | |
| Weaknesses | CWE-321 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2025-11-19T18:19:43.388Z
Reserved: 2025-11-17T15:07:43.941Z
Link: CVE-2025-13316
Updated: 2025-11-19T18:19:39.900Z
Status : Analyzed
Published: 2025-11-19T18:15:48.017
Modified: 2025-11-25T19:36:13.140
Link: CVE-2025-13316
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:24Z