CWE-916
Use of Password Hash With Insufficient Computational Effort
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
CVE-2018-10618 (GCVE-0-2018-10618)
Vulnerability from cvelistv5
Published
2018-08-01 18:00
Modified
2024-09-16 19:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT
Summary
Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:46:46.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104940", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104940" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01" }, { "name": "45076", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45076/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DVW-3200N", "vendor": "Davolink", "versions": [ { "status": "affected", "version": "all version prior to Version 1.00.06" } ] } ], "datePublic": "2018-07-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-03T09:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "104940", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104940" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01" }, { "name": "45076", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/45076/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-07-31T00:00:00", "ID": "CVE-2018-10618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DVW-3200N", "version": { "version_data": [ { "version_value": "all version prior to Version 1.00.06" } ] } } ] }, "vendor_name": "Davolink" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916" } ] } ] }, "references": { "reference_data": [ { "name": "104940", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104940" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01" }, { "name": "45076", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45076/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-10618", "datePublished": "2018-08-01T18:00:00Z", "dateReserved": "2018-05-01T00:00:00", "dateUpdated": "2024-09-16T19:31:23.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13811 (GCVE-0-2018-13811)
Vulnerability from cvelistv5
Published
2018-12-13 16:00
Modified
2024-08-05 09:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions < V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens AG | SIMATIC STEP 7 (TIA Portal) |
Version: SIMATIC STEP 7 (TIA Portal) : All Versions < V15.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:14:47.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf" }, { "name": "105926", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105926" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SIMATIC STEP 7 (TIA Portal)", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "SIMATIC STEP 7 (TIA Portal) : All Versions \u003c V15.1" } ] } ], "datePublic": "2018-12-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions \u003c V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916: Use of Password Hash With Insufficient Computational Effort", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-14T10:57:02", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf" }, { "name": "105926", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105926" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2018-13811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC STEP 7 (TIA Portal)", "version": { "version_data": [ { "version_value": "SIMATIC STEP 7 (TIA Portal) : All Versions \u003c V15.1" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions \u003c V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-916: Use of Password Hash With Insufficient Computational Effort" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf" }, { "name": "105926", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105926" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2018-13811", "datePublished": "2018-12-13T16:00:00", "dateReserved": "2018-07-10T00:00:00", "dateUpdated": "2024-08-05T09:14:47.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-15717 (GCVE-0-2018-15717)
Vulnerability from cvelistv5
Published
2018-12-12 19:00
Modified
2024-09-17 00:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - Passwords stored as MD5 hashes
Summary
Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Open Dental | Open Dental |
Version: 18.3 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.604Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2018-44" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Dental", "vendor": "Open Dental", "versions": [ { "status": "affected", "version": "18.3 and below" } ] } ], "datePublic": "2018-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916 Passwords stored as MD5 hashes", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-12T18:57:01", "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2018-44" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnreport@tenable.com", "DATE_PUBLIC": "2018-12-12T00:00:00", "ID": "CVE-2018-15717", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Dental", "version": { "version_data": [ { "version_value": "18.3 and below" } ] } } ] }, "vendor_name": "Open Dental" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-916 Passwords stored as MD5 hashes" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/security/research/tra-2018-44", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2018-44" } ] } } } }, "cveMetadata": { "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "assignerShortName": "tenable", "cveId": "CVE-2018-15717", "datePublished": "2018-12-12T19:00:00Z", "dateReserved": "2018-08-22T00:00:00", "dateUpdated": "2024-09-17T00:26:20.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10040 (GCVE-0-2020-10040)
Vulnerability from cvelistv5
Published
2020-07-14 13:18
Modified
2024-08-04 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens AG | SICAM MMU |
Version: All versions < V2.05 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM MMU", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V2.05" } ] }, { "product": "SICAM SGU", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SICAM T", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V2.18" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM MMU (All versions \u003c V2.05), SICAM SGU (All versions), SICAM T (All versions \u003c V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916: Use of Password Hash With Insufficient Computational Effort", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-14T13:18:04", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2020-10040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM MMU", "version": { "version_data": [ { "version_value": "All versions \u003c V2.05" } ] } }, { "product_name": "SICAM SGU", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SICAM T", "version": { "version_data": [ { "version_value": "All versions \u003c V2.18" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM MMU (All versions \u003c V2.05), SICAM SGU (All versions), SICAM T (All versions \u003c V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-916: Use of Password Hash With Insufficient Computational Effort" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-10040", "datePublished": "2020-07-14T13:18:04", "dateReserved": "2020-03-04T00:00:00", "dateUpdated": "2024-08-04T10:50:57.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12069 (GCVE-0-2020-12069)
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2025-04-14 16:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CODESYS | CODESYS V3 containing the CmpUserMgr |
Version: V3 < V3.5.16.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2021-061/" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-031/" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-022/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-12069", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T16:17:42.834492Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-14T16:17:54.368Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CODESYS V3 containing the CmpUserMgr", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.16.0", "status": "affected", "version": "V3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device." } ], "value": "In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-15T05:40:17.087Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=" }, { "tags": [ "vendor-advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2021-061/" }, { "tags": [ "vendor-advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-031/" }, { "tags": [ "vendor-advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-022/" } ], "source": { "discovery": "UNKNOWN" }, "title": "CODESYS V3 prone to Inadequate Password Hashing", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12069", "datePublished": "2022-12-26T00:00:00.000Z", "dateReserved": "2020-04-22T00:00:00.000Z", "dateUpdated": "2025-04-14T16:17:54.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14389 (GCVE-0-2020-14389)
Vulnerability from cvelistv5
Published
2020-11-17 00:00
Modified
2024-08-04 12:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875843%2C" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "keycloak", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875843%2C" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14389", "datePublished": "2020-11-17T00:00:00", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:46:34.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14512 (GCVE-0-2020-14512)
Vulnerability from cvelistv5
Published
2020-08-25 13:20
Modified
2024-09-17 03:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT
Summary
GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Secomea | GateManager |
Version: All versions prior to 9.2c < 9.2c |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GateManager", "vendor": "Secomea", "versions": [ { "lessThan": "9.2c", "status": "affected", "version": "All versions prior to 9.2c", "versionType": "custom" } ] } ], "datePublic": "2020-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-25T13:20:49", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01" } ], "source": { "defect": [ "ICSA-20-210-01" ], "discovery": "EXTERNAL" }, "title": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2020-07-28T00:00:00.000Z", "ID": "CVE-2020-14512", "STATE": "PUBLIC", "TITLE": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GateManager", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "All versions prior to 9.2c", "version_value": "9.2c" } ] } } ] }, "vendor_name": "Secomea" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01" } ] }, "source": { "defect": [ "ICSA-20-210-01" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-14512", "datePublished": "2020-08-25T13:20:49.817727Z", "dateReserved": "2020-06-19T00:00:00", "dateUpdated": "2024-09-17T03:07:15.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14516 (GCVE-0-2020-14516)
Vulnerability from cvelistv5
Published
2021-03-18 17:55
Modified
2024-08-04 12:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT
Summary
In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Rockwell Automation FactoryTalk Services Platform |
Version: v6.10.00, v6.11.00 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rockwell Automation FactoryTalk Services Platform", "vendor": "n/a", "versions": [ { "status": "affected", "version": "v6.10.00, v6.11.00" } ] } ], "descriptions": [ { "lang": "en", "value": "In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-18T17:55:55", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-14516", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rockwell Automation FactoryTalk Services Platform", "version": { "version_data": [ { "version_value": "v6.10.00, v6.11.00" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-14516", "datePublished": "2021-03-18T17:55:55", "dateReserved": "2020-06-19T00:00:00", "dateUpdated": "2024-08-04T12:46:34.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-16231 (GCVE-0-2020-16231)
Vulnerability from cvelistv5
Published
2022-05-19 17:21
Modified
2025-04-16 17:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:54.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-16231", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T17:29:07.347671Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T17:54:00.512Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "M1 Hardware Controller MX207", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MX213", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MX220", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MC206", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MC212", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MC220", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MH230", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MC205", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MC210", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MH212", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller ME203", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller CS200", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MP213", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MP226", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MPC240", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MPC265", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MPC270", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MPC293", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller MPE270", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] }, { "product": "M1 Hardware Controller CPC210", "vendor": "Bachmann Electronic, GmbH", "versions": [ { "lessThan": "All*", "status": "affected", "version": "MSYS v1.06.14", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-19T17:21:37.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02" } ], "source": { "advisory": "ICSA-21-026-02", "discovery": "UNKNOWN" }, "title": "All Bachmann M1 System Processor Modules - Use of Password Hash with Insufficient Computational Effort", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-16231", "STATE": "PUBLIC", "TITLE": "All Bachmann M1 System Processor Modules - Use of Password Hash with Insufficient Computational Effort" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "M1 Hardware Controller MX207", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MX213", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MX220", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MC206", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MC212", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MC220", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MH230", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MC205", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MC210", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MH212", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller ME203", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller CS200", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MP213", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MP226", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MPC240", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MPC265", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MPC270", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MPC293", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller MPE270", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } }, { "product_name": "M1 Hardware Controller CPC210", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "All", "version_value": "MSYS v1.06.14" } ] } } ] }, "vendor_name": "Bachmann Electronic, GmbH" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-916 Use of Password Hash With Insufficient Computational Effort" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02" } ] }, "source": { "advisory": "ICSA-21-026-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-16231", "datePublished": "2022-05-19T17:21:37.000Z", "dateReserved": "2020-07-31T00:00:00.000Z", "dateUpdated": "2025-04-16T17:54:00.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6780 (GCVE-0-2020-6780)
Vulnerability from cvelistv5
Published
2021-01-25 18:41
Modified
2024-09-17 01:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:11:05.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FSM-2500", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "5.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FSM-5000", "vendor": "Bosch", "versions": [ { "lessThanOrEqual": "5.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-25T18:41:41", "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "shortName": "bosch" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html" } ], "source": { "advisory": "BOSCH-SA-332072-BT", "discovery": "INTERNAL" }, "title": "Password Hash With Insufficient Computational Effort in the Database of Bosch FSM-2500 Server and Bosch FSM-5000 Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@bosch.com", "DATE_PUBLIC": "2021-01-20", "ID": "CVE-2020-6780", "STATE": "PUBLIC", "TITLE": "Password Hash With Insufficient Computational Effort in the Database of Bosch FSM-2500 Server and Bosch FSM-5000 Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FSM-2500", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.2" } ] } }, { "product_name": "FSM-5000", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.2" } ] } } ] }, "vendor_name": "Bosch" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-916 Use of Password Hash With Insufficient Computational Effort" } ] } ] }, "references": { "reference_data": [ { "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html", "refsource": "MISC", "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html" } ] }, "source": { "advisory": "BOSCH-SA-332072-BT", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c", "assignerShortName": "bosch", "cveId": "CVE-2020-6780", "datePublished": "2021-01-25T18:41:41.783722Z", "dateReserved": "2020-01-10T00:00:00", "dateUpdated": "2024-09-17T01:11:14.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-51
Phase: Architecture and Design
Description:
- Use an adaptive hash function that can be configured to change the amount of computational effort needed to compute the hash, such as the number of iterations ("stretching") or the amount of memory required. Some hash functions perform salting automatically. These functions can significantly increase the overhead for a brute force attack compared to intentionally-fast functions such as MD5. For example, rainbow table attacks can become infeasible due to the high computing overhead. Finally, since computing power gets faster and cheaper over time, the technique can be reconfigured to increase the workload without forcing an entire replacement of the algorithm in use.
- Some hash functions that have one or more of these desired properties include bcrypt [REF-291], scrypt [REF-292], and PBKDF2 [REF-293]. While there is active debate about which of these is the most effective, they are all stronger than using salts with hash functions with very little computing overhead.
- Note that using these functions can have an impact on performance, so they require special consideration to avoid denial-of-service attacks. However, their configurability provides finer control over how much CPU and memory is used, so it could be adjusted to suit the environment's needs.
Mitigation ID: MIT-25
Phases: Implementation, Architecture and Design
Description:
- When using industry-approved techniques, use them correctly. Don't cut corners by skipping resource-intensive steps (CWE-325). These steps are often essential for preventing common attacks.
CAPEC-55: Rainbow Table Password Cracking
An attacker gets access to the database table where hashes of passwords are stored. They then use a rainbow table of pre-computed hash chains to attempt to look up the original password. Once the original password corresponding to the hash is obtained, the attacker uses the original password to gain access to the system.