CVE-2021-23855

The user and password data base is exposed by an unprotected web server resource. Passwords are hashed with a weak hashing algorithm and therefore allow an attacker to determine the password by using rainbow tables.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:bosch:rexroth_indramotion_xlc_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:bosch:rexroth_indramotion_xlc:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:bosch:rexroth_indramotion_mlc_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:bosch:rexroth_indramotion_mlc:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
References () https://psirt.bosch.com/security-advisories/bosch-sa-741752.html - Vendor Advisory () https://psirt.bosch.com/security-advisories/bosch-sa-741752.html - Vendor Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 8.6

Information

Published : 2021-10-04 18:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23855

Mitre link : CVE-2021-23855

CVE.ORG link : CVE-2021-23855


JSON object : View

Products Affected

bosch

  • rexroth_indramotion_mlc_firmware
  • rexroth_indramotion_xlc
  • rexroth_indramotion_mlc
  • rexroth_indramotion_xlc_firmware
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-326

Inadequate Encryption Strength