CWE-1394: Use of Default Cryptographic Key
low-riskThe product uses a default cryptographic key for potentially critical functionality.
Abstraction: Base
Common Consequences
Authentication
→
Gain Privileges or Assume Identity
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-48956 | 9.8 | 8.9% | — |
| CVE-2024-29037 | 9.1 | 0.3% | — |
| CVE-2024-11619 | 5.0 | 0.2% | — |
| CVE-2025-41742 | 9.8 | 0.2% | — |
| CVE-2025-1688 | 5.5 | 0.2% | — |
| CVE-2024-10748 | 2.5 | 0.1% | — |
| CVE-2025-26849 | 4.3 | 0.1% | — |
| CVE-2025-41744 | 9.1 | 0.1% | — |
| CVE-2025-44954 | 9.0 | 0.1% | — |
| CVE-2025-55049 | 9.1 | 0.0% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal