CVE-2020-6780

Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:bosch:fsm-2500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:bosch:fsm-2500:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:bosch:fsm-5000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:bosch:fsm-5000:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 4.9
v2 : 4.0
v3 : 4.4
References () https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html - Vendor Advisory () https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html - Vendor Advisory

Information

Published : 2021-01-26 18:16

Updated : 2024-11-21 05:36


NVD link : CVE-2020-6780

Mitre link : CVE-2020-6780

CVE.ORG link : CVE-2020-6780


JSON object : View

Products Affected

bosch

  • fsm-5000
  • fsm-2500
  • fsm-5000_firmware
  • fsm-2500_firmware
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort