Cyber Posture

CVE-2025-58744

High

Published: 20 January 2026

Published
20 January 2026
Modified
10 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 6.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-58744 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Milner Imagedirector Capture. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-798 CWE-1392

Policy and procedures prohibit hard-coded credentials in favor of managed authentication.

addresses: CWE-798 CWE-1392

Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.

addresses: CWE-798 CWE-1392

Strategy enforces supplier requirements and code reviews that reduce hard-coded credentials introduced through acquired products.

addresses: CWE-798 CWE-1392

Requiring security functional requirements and acceptance criteria allows contracts to prohibit hard-coded credentials in delivered systems or components.

addresses: CWE-798 CWE-1392

Known vulnerabilities section of admin docs covers hard-coded credentials and how to replace them, limiting their use in deployments.

addresses: CWE-798

Enables users to notice when hard-coded credentials have been exploited for unauthorized access.

addresses: CWE-798

Security training explicitly warns against hard-coded credentials, lowering their use in systems.

addresses: CWE-1392

Mandates replacement of default credentials during secure configuration and provisioning procedures.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Hard-coded key enables remote decryption and access to sensitive local archive files, directly facilitating data collection from the system.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Use of Default Credentials, Hard-coded Credentials vulnerability in C2SGlobalSettings.dll in Milner ImageDirector Capture on Windows allows decryption of document archive files using credentials decrypted with hard-coded application encryption key. This issue affects ImageDirector Capture: from 7.0.9.0 before 7.6.3.25808.

Deeper analysisAI

CVE-2025-58744, published on 2026-01-20, is a Use of Default Credentials and Hard-coded Credentials vulnerability (CWE-798, CWE-1392) in the C2SGlobalSettings.dll component of Milner ImageDirector Capture on Windows. The flaw allows decryption of document archive files using credentials decrypted with a hard-coded application encryption key. It affects ImageDirector Capture versions from 7.0.9.0 before 7.6.3.25808 and has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants access to decrypt sensitive document archive files, leading to high confidentiality impact without affecting integrity or availability.

Mitigation involves upgrading to ImageDirector Capture version 7.6.3.25808 or later. Additional details are available in the advisory at https://sra.io/advisories.

Details

CWE(s)

Affected Products

milner
imagedirector capture
7.0.9 — 7.6.3.25808

CVEs Like This One

CVE-2025-58743Same product: Microsoft Windows
CVE-2025-14974Same product: Microsoft Windows
CVE-2025-0976Same product: Microsoft Windows
CVE-2025-24984Same vendor: Microsoft
CVE-2025-58741Same product: Milner Imagedirector Capture
CVE-2025-21343Same vendor: Microsoft
CVE-2025-24991Same vendor: Microsoft
CVE-2026-0905Same product: Microsoft Windows
CVE-2025-1915Same product: Microsoft Windows
CVE-2026-23568Same product: Microsoft Windows

References