CVE-2025-32874 – Kaseya Rapid Fire Tools Network Detective Cryptographic Implementation Flaw

The following table lists the changes that have been made to the
CVE-2025-32874 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 16, 2025

    Action Type Old Value New Value
    Added Description An issue was discovered in Kaseya Rapid Fire Tools Network Detective through 2.0.16.0. A vulnerability exists in the EncryptionUtil class because symmetric encryption is implemented in a deterministic and non-randomized fashion. The method Encrypt(byte[] clearData) derives both the encryption key and the IV from a fixed, hardcoded input by using a static salt value. As a result, identical plaintext inputs always produce identical ciphertext outputs. This is true for both FIPS and non-FIPS generated passwords. In other words, there is a cryptographic implementation flaw in the password encryption mechanism. Although there are multiple encryption methods grouped under FIPS and non-FIPS classifications, the logic consistently results in predictable and reversible encrypted outputs due to the lack of per-operation randomness and encryption authentication.
    Added Reference https://codykretsinger.com
    Added Reference https://galacticadvisors.com
    Added Reference https://www.galacticadvisors.com/release/critical-vulnerabilities-in-network-detective/
Share the Post:

Related Posts