An issue was discovered in Flexense DiskBoss 8.8.16 and earlier. Due to the usage of plaintext information from the handshake as input for the encryption key used for the encryption of the rest of the session, the server and client disclose sensitive information, such as the authentication credentials, to any man-in-the-middle (MiTM) listener.
References
Link | Resource |
---|---|
https://github.com/bitsadmin/exploits/tree/master/CVE-2018-5261 | Exploit Third Party Advisory |
https://github.com/bitsadmin/exploits/tree/master/CVE-2018-5261 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bitsadmin/exploits/tree/master/CVE-2018-5261 - Exploit, Third Party Advisory |
Information
Published : 2018-02-02 21:29
Updated : 2024-11-21 04:08
NVD link : CVE-2018-5261
Mitre link : CVE-2018-5261
CVE.ORG link : CVE-2018-5261
JSON object : View
Products Affected
flexense
- diskboss
CWE
CWE-311
Missing Encryption of Sensitive Data