Metrics
Affected Vendors & Products
Solution
ConnectWise deprecated the tool in July 2023 and provided a new utility that does not contain hardcoded keys. The previous tool relied on a third-party utility that required credentials to be stored locally to perform authenticated network scans. Partners who still have the deprecated tool on their systems should remove it.
Workaround
No workaround given by the vendor.
Wed, 03 Sep 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-798 |
Wed, 03 Sep 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-321 |
Wed, 13 Aug 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Connectwise
Connectwise risk Assessment |
|
CPEs | cpe:2.3:a:connectwise:risk_assessment:*:*:*:*:*:*:*:* | |
Vendors & Products |
Connectwise
Connectwise risk Assessment |
Mon, 19 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 19 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ConnectWise-Password-Encryption-Utility.exe in ConnectWise Risk Assessment allows an attacker to extract a hardcoded AES decryption key via reverse engineering. This key is embedded in plaintext within the binary and used in cryptographic operations without dynamic key management. Once obtained the key can be used to decrypt CSV input files used for authenticated network scanning. | |
Title | Hardcoded Key Revealed in ConnectWise Password Encryption Utility | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ConnectWise
Published:
Updated: 2025-09-03T16:33:11.971Z
Reserved: 2025-05-16T20:18:46.987Z
Link: CVE-2025-4876

Updated: 2025-05-19T16:49:23.512Z

Status : Analyzed
Published: 2025-05-19T16:15:35.107
Modified: 2025-10-02T01:42:14.220
Link: CVE-2025-4876

No data.

No data.