Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58740: CWE-321 Use of Hard-coded Cryptographic Key in Milner ImageDirector Capture

0
High
VulnerabilityCVE-2025-58740cvecve-2025-58740cwe-321
Published: Tue Jan 20 2026 (01/20/2026, 21:36:00 UTC)
Source: CVE Database V5
Vendor/Project: Milner
Product: ImageDirector Capture

Description

The use of a hard-coded encryption key in calls to the Password function in C2SGlobalSettings.dll in Milner ImageDirector Capture on Windows allows a local attacker to decrypt database credentials by reading the cryptographic key from the executable. This issue affects ImageDirector Capture: from 7.0.9 before 7.6.3.25808.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:05:56 UTC

Technical Analysis

CVE-2025-58740 is a vulnerability classified under CWE-321, indicating the use of a hard-coded cryptographic key within the Milner ImageDirector Capture software, specifically in the C2SGlobalSettings.dll component on Windows platforms. The affected versions range from 7.0.9 up to but not including 7.6.3.25808. The vulnerability arises because the cryptographic key used in the Password function is embedded directly in the executable, allowing a local attacker with read access to the binary to extract this key. Once obtained, the attacker can decrypt database credentials stored or managed by the application, compromising sensitive authentication material. The vulnerability requires local access with low privileges (PR:L) but does not require user interaction (UI:N) or additional authentication (AT:N). The CVSS 4.0 base score is 8.5, reflecting high severity due to the high impact on confidentiality (VC:H) and availability (VA:H), with limited integrity impact (VI:L). The scope is high (S:H), indicating that exploitation could affect resources beyond the initially vulnerable component. Although no public exploits are known, the presence of hard-coded keys is a critical security flaw that can facilitate privilege escalation or lateral movement within a compromised network. The vulnerability affects organizations using Milner ImageDirector Capture for image and document capture workflows, potentially exposing sensitive database credentials that could be leveraged to access backend systems or data stores.

Potential Impact

For European organizations, the impact of CVE-2025-58740 can be significant, especially in sectors relying on document imaging and capture solutions such as healthcare, legal, finance, and government agencies. The compromise of database credentials could lead to unauthorized access to sensitive data repositories, undermining confidentiality and potentially causing data breaches. This could result in regulatory non-compliance with GDPR and other data protection laws, leading to legal and financial penalties. Additionally, attackers gaining access through decrypted credentials might move laterally within networks, escalating privileges or disrupting operations, impacting availability. The vulnerability's requirement for local access limits remote exploitation but raises concerns for insider threats or attackers who have already gained foothold in the network. Organizations with distributed imaging infrastructure or remote offices may face challenges in securing all endpoints. The high severity score underscores the urgency to address this vulnerability to prevent potential exploitation and data compromise.

Mitigation Recommendations

1. Apply official patches or updates from Milner as soon as they become available to remove the hard-coded key and implement secure key management practices. 2. Until patches are released, restrict local access to systems running ImageDirector Capture by enforcing strict access controls, limiting user permissions, and using endpoint security solutions to monitor and block unauthorized file access. 3. Employ application whitelisting and integrity monitoring on the C2SGlobalSettings.dll and related binaries to detect unauthorized modifications or attempts to extract embedded keys. 4. Rotate database credentials regularly and implement multi-factor authentication for database access to reduce the risk posed by compromised credentials. 5. Monitor logs and network traffic for unusual access patterns or attempts to use decrypted credentials to access backend systems. 6. Conduct internal audits and penetration tests focusing on local privilege escalation vectors to identify and remediate similar weaknesses. 7. Educate staff about the risks of local privilege misuse and enforce policies to minimize insider threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SRA
Date Reserved
2025-09-04T15:27:48.361Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ff8c24623b1157c513d00

Added to database: 1/20/2026, 9:50:58 PM

Last enriched: 1/20/2026, 10:05:56 PM

Last updated: 2/7/2026, 8:06:31 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats