CVE-2026-22906
Published: 09 February 2026
Summary
CVE-2026-22906 is a critical-severity Use of Hard-coded Cryptographic Key (CWE-321) vulnerability in Certvde (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Credentials In Files (T1552.001); ranked at the 20.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires FIPS-validated cryptographic mechanisms to protect confidentiality of information at rest, such as user credentials in configuration files, preventing weak AES-ECB encryption.
Mandates secure management and protection of authenticators like usernames and passwords during storage, directly addressing improper credential storage in configuration files.
Establishes and manages cryptographic keys securely without hardcoding, countering the use of hardcoded keys for decrypting stored credentials.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hardcoded AES key for credentials in config file directly enables plaintext recovery from obtained files (T1552.001).
NVD Description
User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass.
Deeper analysisAI
CVE-2026-22906 is a critical vulnerability (CVSS score 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) involving the storage of user credentials using AES-ECB encryption with a hardcoded key in a configuration file. This flaw, classified under CWE-321 (Use of Hard-coded Cryptographic Key), affects the software or component where the configuration file is used for authentication, allowing straightforward decryption of sensitive data. The issue was publicly disclosed on 2026-02-09.
An unauthenticated remote attacker can exploit this vulnerability by obtaining the configuration file, enabling them to decrypt and recover plaintext usernames and passwords. The impact is amplified when combined with an authentication bypass, potentially granting full unauthorized access to the system, as indicated by the high confidentiality, integrity, and availability impacts in the CVSS vector.
Mitigation details are outlined in the advisory at https://certvde.com/de/advisories/VDE-2026-004.
Details
- CWE(s)