{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-8095","assignerOrgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","state":"PUBLISHED","assignerShortName":"ProgressSoftware","dateReserved":"2025-07-23T16:36:12.176Z","datePublished":"2026-04-14T13:13:43.739Z","dateUpdated":"2026-04-15T03:58:13.601Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","shortName":"ProgressSoftware","dateUpdated":"2026-04-14T13:13:43.739Z"},"title":"Recoverable obfuscation using the OECH1 prefix encoding in OpenEdge","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-257","description":"CWE-257","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-21","descriptions":[{"lang":"en","value":"CAPEC-21 Exploitation of Trusted Identifiers"}]}],"affected":[{"vendor":"Progress Software Corporation","product":"OpenEdge","platforms":["Windows","Linux","64 bit","32 bit"],"modules":["OpenEdge Platform Prefix Encodings"],"versions":[{"status":"affected","version":"12.2.0","lessThanOrEqual":"12.2.18","versionType":"custom"},{"status":"affected","version":"12.8.0","lessThanOrEqual":"12.8.9","versionType":"custom"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"The OECH1 prefix encoding is intended to obfuscate values across the OpenEdge platform.  It has been identified as cryptographically weak and unsuitable for stored encodings and enterprise applications.  OECH1 encodings should be considered exploitable and immediately replaced by any other supported prefix encoding, all of which are based on symmetric encryption.","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><div><span>The OECH1 prefix encoding is intended to obfuscate values across the OpenEdge platform. &nbsp;It has been identified as cryptographically weak and unsuitable for stored encodings and enterprise applications. &nbsp;OECH1 encodings should be considered exploitable and immediately replaced by any other supported prefix encoding, all of which are based on symmetric encryption.</span></div></div>"}]}],"references":[{"url":"https://community.progress.com/s/article/Unintended-Use-of-OECH1-for-Password-Secrets-Protection"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"UNREPORTED","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"NOT_DEFINED","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","version":"4.0","baseSeverity":"CRITICAL","baseScore":9.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/AU:Y/V:D/RE:M/U:Red"}}],"credits":[{"lang":"en","value":"Thomas Riedmaier, Siemens Energy","type":"finder"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-14T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2025-8095"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-15T03:58:13.601Z"}}]}}