{"vulnerability": "cve-2022-37710", "sightings": [{"uuid": "8d991fda-4db7-43bc-a1ab-c76556ff6eb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37710", "type": "seen", "source": "https://t.me/cibsecurity/52580", "content": "\u203c CVE-2022-37710 \u203c\n\nPatterson Dental Eaglesoft 21 has AES-256 encryption but there are two ways to obtain a keyfile: (1) keybackup.data &gt; License &gt; Encryption Key or (2) Eaglesoft.Server.Configuration.data &gt; DbEncryptKeyPrimary &gt; Encryption Key. Applicable files are encrypted with keys and salt that are hardcoded into a DLL or EXE file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-07T02:33:47.000000Z"}]}