Successful exploitation of this vulnerability could allow the attacker to perform unauthorized decryption of sensitive data and Man-in-the-Middle (MitM) attacks on the targeted device.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
* Apply mitigations as per vendor instructions (whenever available) or discontinue the use of the product if mitigations are unavailable. * Perform risk assessment and implement physical security controls to prevent unauthorized access to the device.
Wed, 13 Aug 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve private key stored in the firmware of the targeted device. Successful exploitation of this vulnerability could allow the attacker to perform unauthorized decryption of sensitive data and Man-in-the-Middle (MitM) attacks on the targeted device. | |
Title | Hard-coded Private Key Vulnerability in ZKTeco WL20 | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-08-13T13:01:28.876Z
Reserved: 2025-08-12T11:08:57.777Z
Link: CVE-2025-55279

Updated: 2025-08-13T13:01:26.397Z

Status : Awaiting Analysis
Published: 2025-08-13T12:15:26.907
Modified: 2025-08-13T17:33:46.673
Link: CVE-2025-55279

No data.

No data.