CVE-2023-0452

Econolite EOS versions prior to 3.2.23 use a weak hash algorithm for encrypting privileged user credentials. A configuration file that is accessible without authentication uses MD5 hashes for encrypting credentials, including those of administrators and technicians.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:econolite:eos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:37

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 9.8
Summary
  • (es) Las versiones de Econolite EOS anteriores a la 3.2.23 utilizan un algoritmo hash débil para cifrar las credenciales de usuarios privilegiados. Un archivo de configuración al que se puede acceder sin autenticación utiliza hashes MD5 para cifrar las credenciales, incluidas las de administradores y técnicos.

Information

Published : 2023-01-26 21:18

Updated : 2024-11-21 07:37


NVD link : CVE-2023-0452

Mitre link : CVE-2023-0452

CVE.ORG link : CVE-2023-0452


JSON object : View

Products Affected

econolite

  • eos
CWE
CWE-328

Use of Weak Hash

CWE-327

Use of a Broken or Risky Cryptographic Algorithm