Skip to main content

CVE-2025-4876: CWE-798 Use of Hard-coded Credentials in ConnectWise Risk Assessment

Medium
VulnerabilityCVE-2025-4876cvecve-2025-4876cwe-798
Published: Mon May 19 2025 (05/19/2025, 16:04:34 UTC)
Source: CVE
Vendor/Project: ConnectWise
Product: Risk Assessment

Description

ConnectWise-Password-Encryption-Utility.exe in ConnectWise Risk Assessment allows an attacker to extract a hardcoded AES decryption key via reverse engineering. This key is embedded in plaintext within the binary and used in cryptographic operations without dynamic key management. Once obtained the key can be used to decrypt CSV input files used for authenticated network scanning.

AI-Powered Analysis

AILast updated: 07/11/2025, 17:32:47 UTC

Technical Analysis

CVE-2025-4876 is a vulnerability identified in the ConnectWise Risk Assessment product, specifically within the ConnectWise-Password-Encryption-Utility.exe binary. The issue stems from the use of a hardcoded AES decryption key embedded in plaintext inside the executable. This key is utilized for cryptographic operations related to decrypting CSV input files that are used during authenticated network scanning processes. Because the key is hardcoded and not dynamically managed or protected, an attacker with access to the binary can reverse engineer it to extract the AES key. Once the key is obtained, the attacker can decrypt sensitive CSV files that contain data used for network scanning, potentially exposing confidential information about network assets and configurations. The vulnerability affects all versions of the product prior to its deprecation in July 2023. The CVSS 3.1 base score is 6.0 (medium severity), with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and that the impact is primarily on confidentiality (C:H), with no impact on integrity or availability. This vulnerability falls under CWE-798, which concerns the use of hardcoded credentials or cryptographic keys, a known security anti-pattern that can lead to unauthorized data disclosure if exploited. There are no known exploits in the wild at this time, and no patches have been linked, likely due to the product's deprecation. The vulnerability is significant because it undermines the confidentiality of sensitive network scanning data, which could be leveraged by attackers to gain insights into network topology and vulnerabilities, facilitating further attacks.

Potential Impact

For European organizations using ConnectWise Risk Assessment, this vulnerability poses a risk of unauthorized disclosure of sensitive network scanning data. Such data often includes detailed information about network devices, configurations, and potential vulnerabilities, which could be exploited by threat actors to plan targeted attacks or lateral movement within the network. The requirement for local access and high privileges limits the attack surface somewhat, but insider threats or attackers who have already compromised a low-privilege account could escalate privileges and exploit this vulnerability. The confidentiality breach could lead to exposure of critical infrastructure details, especially in sectors like finance, healthcare, and critical infrastructure, which are heavily regulated in Europe. Given the product is deprecated, organizations still using it may lack vendor support and patches, increasing their risk exposure. Additionally, the vulnerability's impact on confidentiality without affecting integrity or availability means that while systems may continue to operate normally, sensitive data could be silently exfiltrated, complicating detection and response efforts.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Immediate discontinuation of ConnectWise Risk Assessment usage, especially versions prior to July 2023, replacing it with supported and secure alternatives. 2) If continued use is unavoidable, restrict access to systems running the vulnerable utility to trusted administrators only, minimizing the risk of local exploitation. 3) Implement strict privilege management and monitoring to detect unauthorized privilege escalations that could enable exploitation. 4) Conduct internal audits to identify any decrypted CSV files that may have been exposed and assess potential data leakage. 5) Employ binary hardening techniques or runtime protections where possible to complicate reverse engineering efforts, although this is a temporary and less reliable measure. 6) Enhance network segmentation and monitoring to detect suspicious activities related to network scanning and data exfiltration. 7) Educate staff about the risks of using deprecated software and enforce policies to avoid unsupported tools. 8) Engage with ConnectWise or third-party security vendors for any available patches or mitigations, even if unofficial, and monitor threat intelligence feeds for emerging exploit information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ConnectWise
Date Reserved
2025-05-16T20:18:46.987Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb57d

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 5:32:47 PM

Last updated: 8/15/2025, 11:24:02 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats