Products
PLANET Technology switches
Source
twcert@cert.org.tw
Tags
CVE-2024-8453 details
Published : Sept. 30, 2024, 8:15 a.m.
Last Modified : Sept. 30, 2024, 12:45 p.m.
Last Modified : Sept. 30, 2024, 12:45 p.m.
Description
Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords.
CVSS Score
1 | 2 | 3 | 4.9 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-328 | Use of Weak Hash | The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack). |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
4.9
Exploitability Score
1.2
Impact Score
3.6
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
References
URL | Source |
---|---|
https://www.twcert.org.tw/en/cp-139-8056-09688-2.html | twcert@cert.org.tw |
https://www.twcert.org.tw/tw/cp-132-8055-2c361-1.html | twcert@cert.org.tw |
This website uses the NVD API, but is not approved or certified by it.