CWE-916

Use of Password Hash With Insufficient Computational Effort

The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.

CVE-2018-10618 (GCVE-0-2018-10618)
Vulnerability from cvelistv5
Published
2018-08-01 18:00
Modified
2024-09-16 19:31
Severity ?
CWE
  • CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT
Summary
Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
References
Impacted products
Vendor Product Version
Davolink DVW-3200N Version: all version prior to Version 1.00.06
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:46:46.120Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "104940",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/104940"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01"
          },
          {
            "name": "45076",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/45076/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "DVW-3200N",
          "vendor": "Davolink",
          "versions": [
            {
              "status": "affected",
              "version": "all version prior to Version 1.00.06"
            }
          ]
        }
      ],
      "datePublic": "2018-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-08-03T09:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "104940",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/104940"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01"
        },
        {
          "name": "45076",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/45076/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-07-31T00:00:00",
          "ID": "CVE-2018-10618",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "DVW-3200N",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "all version prior to Version 1.00.06"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Davolink"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "104940",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/104940"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01"
            },
            {
              "name": "45076",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/45076/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-10618",
    "datePublished": "2018-08-01T18:00:00Z",
    "dateReserved": "2018-05-01T00:00:00",
    "dateUpdated": "2024-09-16T19:31:23.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-13811 (GCVE-0-2018-13811)
Vulnerability from cvelistv5
Published
2018-12-13 16:00
Modified
2024-08-05 09:14
Severity ?
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions < V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known.
References
Impacted products
Vendor Product Version
Siemens AG SIMATIC STEP 7 (TIA Portal) Version: SIMATIC STEP 7 (TIA Portal) : All Versions < V15.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T09:14:47.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf"
          },
          {
            "name": "105926",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105926"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SIMATIC STEP 7 (TIA Portal)",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "SIMATIC STEP 7 (TIA Portal) : All Versions \u003c V15.1"
            }
          ]
        }
      ],
      "datePublic": "2018-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions \u003c V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916: Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-14T10:57:02",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf"
        },
        {
          "name": "105926",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105926"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "productcert@siemens.com",
          "ID": "CVE-2018-13811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SIMATIC STEP 7 (TIA Portal)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SIMATIC STEP 7 (TIA Portal) : All Versions \u003c V15.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Siemens AG"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions \u003c V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916: Use of Password Hash With Insufficient Computational Effort"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf"
            },
            {
              "name": "105926",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105926"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2018-13811",
    "datePublished": "2018-12-13T16:00:00",
    "dateReserved": "2018-07-10T00:00:00",
    "dateUpdated": "2024-08-05T09:14:47.273Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-15717 (GCVE-0-2018-15717)
Vulnerability from cvelistv5
Published
2018-12-12 19:00
Modified
2024-09-17 00:26
Severity ?
CWE
  • CWE-916 - Passwords stored as MD5 hashes
Summary
Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes.
References
Impacted products
Vendor Product Version
Open Dental Open Dental Version: 18.3 and below
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:01:54.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/research/tra-2018-44"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Open Dental",
          "vendor": "Open Dental",
          "versions": [
            {
              "status": "affected",
              "version": "18.3 and below"
            }
          ]
        }
      ],
      "datePublic": "2018-12-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Passwords stored as MD5 hashes",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-12T18:57:01",
        "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
        "shortName": "tenable"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tenable.com/security/research/tra-2018-44"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vulnreport@tenable.com",
          "DATE_PUBLIC": "2018-12-12T00:00:00",
          "ID": "CVE-2018-15717",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Open Dental",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "18.3 and below"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Open Dental"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916 Passwords stored as MD5 hashes"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tenable.com/security/research/tra-2018-44",
              "refsource": "MISC",
              "url": "https://www.tenable.com/security/research/tra-2018-44"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
    "assignerShortName": "tenable",
    "cveId": "CVE-2018-15717",
    "datePublished": "2018-12-12T19:00:00Z",
    "dateReserved": "2018-08-22T00:00:00",
    "dateUpdated": "2024-09-17T00:26:20.760Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-10040 (GCVE-0-2020-10040)
Vulnerability from cvelistv5
Published
2020-07-14 13:18
Modified
2024-08-04 10:50
Severity ?
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text.
References
Impacted products
Vendor Product Version
Siemens AG SICAM MMU Version: All versions < V2.05
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:50:57.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SICAM MMU",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "All versions \u003c V2.05"
            }
          ]
        },
        {
          "product": "SICAM SGU",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "product": "SICAM T",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "All versions \u003c V2.18"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in SICAM MMU (All versions \u003c V2.05), SICAM SGU (All versions), SICAM T (All versions \u003c V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916: Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-14T13:18:04",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "productcert@siemens.com",
          "ID": "CVE-2020-10040",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SICAM MMU",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions \u003c V2.05"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SICAM SGU",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SICAM T",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions \u003c V2.18"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Siemens AG"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability has been identified in SICAM MMU (All versions \u003c V2.05), SICAM SGU (All versions), SICAM T (All versions \u003c V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916: Use of Password Hash With Insufficient Computational Effort"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf",
              "refsource": "MISC",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2020-10040",
    "datePublished": "2020-07-14T13:18:04",
    "dateReserved": "2020-03-04T00:00:00",
    "dateUpdated": "2024-08-04T10:50:57.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12069 (GCVE-0-2020-12069)
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2025-04-14 16:17
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download="
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2021-061/"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-031/"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-022/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-12069",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-14T16:17:42.834492Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-14T16:17:54.368Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CODESYS V3  containing the CmpUserMgr",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "V3.5.16.0",
              "status": "affected",
              "version": "V3",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device."
            }
          ],
          "value": "In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-15T05:40:17.087Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download="
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2021-061/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2022-031/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2022-022/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS V3 prone to Inadequate Password Hashing",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-12069",
    "datePublished": "2022-12-26T00:00:00.000Z",
    "dateReserved": "2020-04-22T00:00:00.000Z",
    "dateUpdated": "2025-04-14T16:17:54.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-14389 (GCVE-0-2020-14389)
Vulnerability from cvelistv5
Published
2020-11-17 00:00
Modified
2024-08-04 12:46
Severity ?
CWE
Summary
It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.
Impacted products
Vendor Product Version
n/a keycloak Version: before version 12.0.0
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:46:34.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875843%2C"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "keycloak",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 12.0.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-07T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875843%2C"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2020-14389",
    "datePublished": "2020-11-17T00:00:00",
    "dateReserved": "2020-06-17T00:00:00",
    "dateUpdated": "2024-08-04T12:46:34.090Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-14512 (GCVE-0-2020-14512)
Vulnerability from cvelistv5
Published
2020-08-25 13:20
Modified
2024-09-17 03:07
CWE
  • CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT
Summary
GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords.
References
Impacted products
Vendor Product Version
Secomea GateManager Version: All versions prior to 9.2c   < 9.2c
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:46:34.682Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GateManager",
          "vendor": "Secomea",
          "versions": [
            {
              "lessThan": "9.2c",
              "status": "affected",
              "version": "All versions prior to 9.2c",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-07-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-25T13:20:49",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01"
        }
      ],
      "source": {
        "defect": [
          "ICSA-20-210-01"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2020-07-28T00:00:00.000Z",
          "ID": "CVE-2020-14512",
          "STATE": "PUBLIC",
          "TITLE": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GateManager",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "All versions prior to 9.2c",
                            "version_value": "9.2c"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Secomea"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01"
            }
          ]
        },
        "source": {
          "defect": [
            "ICSA-20-210-01"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-14512",
    "datePublished": "2020-08-25T13:20:49.817727Z",
    "dateReserved": "2020-06-19T00:00:00",
    "dateUpdated": "2024-09-17T03:07:15.578Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-14516 (GCVE-0-2020-14516)
Vulnerability from cvelistv5
Published
2021-03-18 17:55
Modified
2024-08-04 12:46
Severity ?
CWE
  • CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT
Summary
In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.
References
Impacted products
Vendor Product Version
n/a Rockwell Automation FactoryTalk Services Platform Version: v6.10.00, v6.11.00
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:46:34.618Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Rockwell Automation FactoryTalk Services Platform",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "v6.10.00, v6.11.00"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-18T17:55:55",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2020-14516",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Rockwell Automation FactoryTalk Services Platform",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "v6.10.00, v6.11.00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-14516",
    "datePublished": "2021-03-18T17:55:55",
    "dateReserved": "2020-06-19T00:00:00",
    "dateUpdated": "2024-08-04T12:46:34.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-16231 (GCVE-0-2020-16231)
Vulnerability from cvelistv5
Published
2022-05-19 17:21
Modified
2025-04-16 17:54
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.
References
Impacted products
Vendor Product Version
Bachmann Electronic, GmbH M1 Hardware Controller MX207 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MX213 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MX220 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MC206 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MC212 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MC220 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MH230 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MC205 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MC210 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MH212 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller ME203 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller CS200 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MP213 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MP226 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MPC240 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MPC265 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MPC270 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MPC293 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller MPE270 Version: MSYS v1.06.14   < All*
Create a notification for this product.
   Bachmann Electronic, GmbH M1 Hardware Controller CPC210 Version: MSYS v1.06.14   < All*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:37:54.211Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-16231",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T17:29:07.347671Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-16T17:54:00.512Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "M1 Hardware Controller MX207",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MX213",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MX220",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC206",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC212",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC220",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MH230",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC205",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC210",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MH212",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller ME203",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller CS200",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MP213",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MP226",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC240",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC265",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC270",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC293",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPE270",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller CPC210",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-19T17:21:37.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02"
        }
      ],
      "source": {
        "advisory": "ICSA-21-026-02",
        "discovery": "UNKNOWN"
      },
      "title": "All Bachmann M1 System Processor Modules - Use of Password Hash with Insufficient Computational Effort",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2020-16231",
          "STATE": "PUBLIC",
          "TITLE": "All Bachmann M1 System Processor Modules - Use of Password Hash with Insufficient Computational Effort"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "M1 Hardware Controller MX207",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MX213",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MX220",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC206",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC212",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC220",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MH230",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC205",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC210",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MH212",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller ME203",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller CS200",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MP213",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MP226",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC240",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC265",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC270",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC293",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPE270",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller CPC210",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bachmann Electronic, GmbH"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916 Use of Password Hash With Insufficient Computational Effort"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02",
              "refsource": "MISC",
              "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02"
            }
          ]
        },
        "source": {
          "advisory": "ICSA-21-026-02",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-16231",
    "datePublished": "2022-05-19T17:21:37.000Z",
    "dateReserved": "2020-07-31T00:00:00.000Z",
    "dateUpdated": "2025-04-16T17:54:00.512Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-6780 (GCVE-0-2020-6780)
Vulnerability from cvelistv5
Published
2021-01-25 18:41
Modified
2024-09-17 01:11
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Summary
Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash.
Impacted products
Vendor Product Version
Bosch FSM-2500 Version: unspecified   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:11:05.108Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "FSM-2500",
          "vendor": "Bosch",
          "versions": [
            {
              "lessThanOrEqual": "5.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "FSM-5000",
          "vendor": "Bosch",
          "versions": [
            {
              "lessThanOrEqual": "5.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-01-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-25T18:41:41",
        "orgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c",
        "shortName": "bosch"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html"
        }
      ],
      "source": {
        "advisory": "BOSCH-SA-332072-BT",
        "discovery": "INTERNAL"
      },
      "title": "Password Hash With Insufficient Computational Effort in the Database of Bosch FSM-2500 Server and Bosch FSM-5000 Server",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@bosch.com",
          "DATE_PUBLIC": "2021-01-20",
          "ID": "CVE-2020-6780",
          "STATE": "PUBLIC",
          "TITLE": "Password Hash With Insufficient Computational Effort in the Database of Bosch FSM-2500 Server and Bosch FSM-5000 Server"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "FSM-2500",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FSM-5000",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bosch"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916 Use of Password Hash With Insufficient Computational Effort"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html",
              "refsource": "MISC",
              "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html"
            }
          ]
        },
        "source": {
          "advisory": "BOSCH-SA-332072-BT",
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c95f66b2-7e7c-41c5-8f09-6f86ec68659c",
    "assignerShortName": "bosch",
    "cveId": "CVE-2020-6780",
    "datePublished": "2021-01-25T18:41:41.783722Z",
    "dateReserved": "2020-01-10T00:00:00",
    "dateUpdated": "2024-09-17T01:11:14.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Mitigation ID: MIT-51

Phase: Architecture and Design

Description:

  • Use an adaptive hash function that can be configured to change the amount of computational effort needed to compute the hash, such as the number of iterations ("stretching") or the amount of memory required. Some hash functions perform salting automatically. These functions can significantly increase the overhead for a brute force attack compared to intentionally-fast functions such as MD5. For example, rainbow table attacks can become infeasible due to the high computing overhead. Finally, since computing power gets faster and cheaper over time, the technique can be reconfigured to increase the workload without forcing an entire replacement of the algorithm in use.
  • Some hash functions that have one or more of these desired properties include bcrypt [REF-291], scrypt [REF-292], and PBKDF2 [REF-293]. While there is active debate about which of these is the most effective, they are all stronger than using salts with hash functions with very little computing overhead.
  • Note that using these functions can have an impact on performance, so they require special consideration to avoid denial-of-service attacks. However, their configurability provides finer control over how much CPU and memory is used, so it could be adjusted to suit the environment's needs.
Mitigation ID: MIT-25

Phases: Implementation, Architecture and Design

Description:

  • When using industry-approved techniques, use them correctly. Don't cut corners by skipping resource-intensive steps (CWE-325). These steps are often essential for preventing common attacks.
CAPEC-55: Rainbow Table Password Cracking

An attacker gets access to the database table where hashes of passwords are stored. They then use a rainbow table of pre-computed hash chains to attempt to look up the original password. Once the original password corresponding to the hash is obtained, the attacker uses the original password to gain access to the system.

Back to CWE stats page