The secret used for validating authentication tokens is...
Critical severity
Unreviewed
Published
Sep 18, 2025
to the GitHub Advisory Database
•
Updated Sep 18, 2025
Description
Published by the National Vulnerability Database
Sep 18, 2025
Published to the GitHub Advisory Database
Sep 18, 2025
Last updated
Sep 18, 2025
The secret used for validating authentication tokens is hardcoded in
device firmware for affected versions. An attacker who obtains the
signing key can bypass authentication, gaining complete access to the
system.
References