Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Hard‑coded AES‑256 Key Enables Remote Decryption, Modification, and Privilege Escalation in FreedomFi Sercomm SCE4255W |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-321 | |
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freedomfi
Freedomfi sercomm Sce4255w |
|
| Vendors & Products |
Freedomfi
Freedomfi sercomm Sce4255w |
Thu, 19 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of a hard-coded AES-256-CBC key in the configuration backup/restore implementation of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote authenticated users to decrypt, modify, and re-encrypt device configurations, enabling credential manipulation and privilege escalation via the GUI import/export functions. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-24T01:17:45.000Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67112
Updated: 2026-03-24T01:17:39.837Z
Status : Awaiting Analysis
Published: 2026-03-19T18:16:15.450
Modified: 2026-03-24T02:16:03.450
Link: CVE-2025-67112
No data.
OpenCVE Enrichment
Updated: 2026-03-25T11:51:43Z