Description
Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27927 | Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash. |
References
History
No history.
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2024-09-17T01:11:14.207Z
Reserved: 2020-01-10T00:00:00.000Z
Link: CVE-2020-6780
No data.
Status : Modified
Published: 2021-01-26T18:16:07.927
Modified: 2024-11-21T05:36:10.617
Link: CVE-2020-6780
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD