EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2014-10/0146.html - | |
References | () http://packetstormsecurity.com/files/128842/EMC-Avamar-Weak-Password-Storage.html - | |
References | () http://www.securityfocus.com/bid/70732 - | |
References | () http://www.securitytracker.com/id/1031117 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/97757 - |
Information
Published : 2014-10-25 10:55
Updated : 2024-11-21 02:10
NVD link : CVE-2014-4623
Mitre link : CVE-2014-4623
CVE.ORG link : CVE-2014-4623
JSON object : View
Products Affected
emc
- avamar
CWE
CWE-310
Cryptographic Issues