{"uuid": "e3e6f558-5ad7-432e-b6ff-63184d001dc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0714", "type": "seen", "source": "https://t.me/cvedetector/18255", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0714 - MobaXterm Static IV Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0714 \nPublished : Feb. 17, 2025, 12:15 p.m. | 30\u00a0minutes ago \nDescription : The vulnerability existed in the password storage of Mobateks MobaXterm below 25.0.  \nMobaXTerm uses an initialization vector (IV) that is generated by encrypting null bytes with a derivate of the users master key. As both the master key is static, and AES ECB produces the same output with the same input the IV for AES CFB is always the same.The static IV makes it easier to obtain sensitive information and decrypt data if the data is stored at rest. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T14:02:22.000000Z"}