CVE-2024-24553
June 24, 2024, 12:57 p.m.
None
No Score
Description
Bludit uses the SHA-1 hashing algorithm to compute password hashes. Thus, attackers could determine cleartext passwords with brute-force attacks due to the inherent speed of SHA-1. In addition, the salt that is computed by Bludit is generated with a non-cryptographically secure function.
Product(s) Impacted
| Product | Versions |
|---|---|
| Bludit |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
CWE-916
Use of Password Hash With Insufficient Computational Effort
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
Tags
Timeline
Published: June 24, 2024, 7:15 a.m.
Last Modified: June 24, 2024, 12:57 p.m.
Last Modified: June 24, 2024, 12:57 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
vulnerability@ncsc.ch
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.