Описание
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
Ссылки
- Broken Link
- Broken LinkPatchThird Party AdvisoryVDB EntryVendor Advisory
- Broken Link
- Broken LinkPatchThird Party AdvisoryVDB EntryVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:arkeia:arkeia:4.2:*:*:*:*:*:*:*
cpe:2.3:a:arkeia:arkeia:4.2.8-2:*:*:*:*:*:*:*
EPSS
Процентиль: 57%
0.00355
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-916
Связанные уязвимости
CVSS3: 9.8
github
почти 4 года назад
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
EPSS
Процентиль: 57%
0.00355
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-916