6.5
CVSSv3

CVE-2025-0714

CVSSv4: NA | CVSSv3: 6.5 | CVSSv2: NA | VMScore: 750 | EPSS: 0.00015 | KEV: Not Included
Published: 17/02/2025 Updated: 19/02/2025

Vulnerability Summary

MobaXterm Password Encryption Vulnerability in Versions Below 25.0

A vulnerability in MobaXterm versions before 25.0 exists in its password storage mechanism. The software uses a master key derived from the user's password and an initialisation vector (IV) consisting only of zero bytes to encrypt passwords. When MobaXterm starts, users are prompted for their password, which is then used to generate the master key. Because both the master key and IV remain constant for each stored password, the AES CFB ciphertext depends solely on the plaintext password. This approach creates a significant security weakness, as the static IV and master key make it considerably easier for attackers to potentially decrypt and obtain sensitive password information when the data is stored at rest.

Solution

Update MobaXterm to v25.0 and reencrypt passwords that were encrypted with a vulnerable version of MobaXterm.
Vulnerable Product Search on Vulmon Subscribe to Product

mobatek mobaxterm