CVE-2025-26486 (GCVE-0-2025-26486)
Vulnerability from cvelistv5
Published
2025-03-19 15:46
Modified
2025-07-02 14:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Broken or Risky Cryptographic Algorithm, Use of Password Hash
With Insufficient Computational Effort, Use of Weak Hash, Use of a
One-Way Hash with a Predictable Salt vulnerabilities in Beta80 "Life 1st Identity Manager"
enable an attacker with access to
password hashes
to bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses "Life 1st Identity Manager" as a service for authentication.
This issue affects Life 1st: 1.5.2.14234.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26486", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-19T18:28:07.501414Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-19T18:28:28.268Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Life 1st", "vendor": "Beta80", "versions": [ { "status": "affected", "version": "1.5.2.14234" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broken or Risky Cryptographic Algorithm, Use of Password Hash \nWith Insufficient Computational Effort, Use of Weak Hash, Use of a \nOne-Way Hash with a Predictable Salt vulnerabilities in Beta80 \"Life 1st Identity Manager\"\nenable an attacker with access to\npassword hashes\nto bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses \"Life 1st Identity Manager\" as a service for authentication.\u003cbr\u003e\u003cp\u003eThis issue affects Life 1st: 1.5.2.14234.\u003c/p\u003e" } ], "value": "Broken or Risky Cryptographic Algorithm, Use of Password Hash \nWith Insufficient Computational Effort, Use of Weak Hash, Use of a \nOne-Way Hash with a Predictable Salt vulnerabilities in Beta80 \"Life 1st Identity Manager\"\nenable an attacker with access to\npassword hashes\nto bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses \"Life 1st Identity Manager\" as a service for authentication.\nThis issue affects Life 1st: 1.5.2.14234." } ], "impacts": [ { "capecId": "CAPEC-49", "descriptions": [ { "lang": "en", "value": "CAPEC-49 Password Brute Forcing" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-328", "description": "CWE-328 Use of Weak Hash", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-760", "description": "CWE-760 Use of a One-Way Hash with a Predictable Salt", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-02T14:34:15.470Z", "orgId": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", "shortName": "ENISA" }, "references": [ { "tags": [ "government-resource" ], "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26486" }, { "tags": [ "vdb-entry" ], "url": "https://euvd.enisa.europa.eu/vulnerability/CVE-2025-26486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", "assignerShortName": "ENISA", "cveId": "CVE-2025-26486", "datePublished": "2025-03-19T15:46:34.309Z", "dateReserved": "2025-02-11T08:24:51.661Z", "dateUpdated": "2025-07-02T14:34:15.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-26486\",\"sourceIdentifier\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\",\"published\":\"2025-03-19T16:15:31.457\",\"lastModified\":\"2025-07-02T15:15:25.807\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Broken or Risky Cryptographic Algorithm, Use of Password Hash \\nWith Insufficient Computational Effort, Use of Weak Hash, Use of a \\nOne-Way Hash with a Predictable Salt vulnerabilities in Beta80 \\\"Life 1st Identity Manager\\\"\\nenable an attacker with access to\\npassword hashes\\nto bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses \\\"Life 1st Identity Manager\\\" as a service for authentication.\\nThis issue affects Life 1st: 1.5.2.14234.\"},{\"lang\":\"es\",\"value\":\"El uso de un algoritmo criptogr\u00e1fico roto o riesgoso, el uso de un hash de contrase\u00f1a con un esfuerzo computacional insuficiente, el uso de un hash d\u00e9bil, el uso de un hash unidireccional con una vulnerabilidad de sal predecible en Beta80 Life 1st permite a un atacante usar la fuerza bruta de las contrase\u00f1as de los usuarios o encontrar una colisi\u00f3n para obtener acceso a una aplicaci\u00f3n de destino que utiliza BETA80 \\\"Life 1st Identity Manager\\\" como un servicio para la autenticaci\u00f3n. Este problema afecta a Life 1st: 1.5.2.14234.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.5,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"},{\"lang\":\"en\",\"value\":\"CWE-328\"},{\"lang\":\"en\",\"value\":\"CWE-760\"},{\"lang\":\"en\",\"value\":\"CWE-916\"}]}],\"references\":[{\"url\":\"https://euvd.enisa.europa.eu/vulnerability/CVE-2025-26486\",\"source\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\"},{\"url\":\"https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26486\",\"source\":\"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-26486\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-19T18:28:07.501414Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-19T18:28:24.443Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-49\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-49 Password Brute Forcing\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Beta80\", \"product\": \"Life 1st\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.5.2.14234\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26486\", \"tags\": [\"government-resource\"]}, {\"url\": \"https://euvd.enisa.europa.eu/vulnerability/CVE-2025-26486\", \"tags\": [\"vdb-entry\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Broken or Risky Cryptographic Algorithm, Use of Password Hash \\nWith Insufficient Computational Effort, Use of Weak Hash, Use of a \\nOne-Way Hash with a Predictable Salt vulnerabilities in Beta80 \\\"Life 1st Identity Manager\\\"\\nenable an attacker with access to\\npassword hashes\\nto bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses \\\"Life 1st Identity Manager\\\" as a service for authentication.\\nThis issue affects Life 1st: 1.5.2.14234.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Broken or Risky Cryptographic Algorithm, Use of Password Hash \\nWith Insufficient Computational Effort, Use of Weak Hash, Use of a \\nOne-Way Hash with a Predictable Salt vulnerabilities in Beta80 \\\"Life 1st Identity Manager\\\"\\nenable an attacker with access to\\npassword hashes\\nto bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses \\\"Life 1st Identity Manager\\\" as a service for authentication.\u003cbr\u003e\u003cp\u003eThis issue affects Life 1st: 1.5.2.14234.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-327\", \"description\": \"CWE-327 Use of a Broken or Risky Cryptographic Algorithm\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-916\", \"description\": \"CWE-916 Use of Password Hash With Insufficient Computational Effort\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-328\", \"description\": \"CWE-328 Use of Weak Hash\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-760\", \"description\": \"CWE-760 Use of a One-Way Hash with a Predictable Salt\"}]}], \"providerMetadata\": {\"orgId\": \"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\", \"shortName\": \"ENISA\", \"dateUpdated\": \"2025-07-02T14:34:15.470Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-26486\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-02T14:34:15.470Z\", \"dateReserved\": \"2025-02-11T08:24:51.661Z\", \"assignerOrgId\": \"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158\", \"datePublished\": \"2025-03-19T15:46:34.309Z\", \"assignerShortName\": \"ENISA\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…