CVE-2024-36440

An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used.
Configurations

No configuration.

History

21 Nov 2024, 09:22

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Aug/31 -

23 Aug 2024, 16:18

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema en los dispositivos Swissphone DiCal-RED 4009. Un atacante con acceso al archivo /etc/deviceconfig puede recuperar la contraseña del dispositivo administrativo mediante métodos de descifrado de contraseñas, porque se utiliza MD5 sin sal.

22 Aug 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CWE CWE-1393
CWE-759
CWE-327

22 Aug 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-22 15:15

Updated : 2024-11-21 09:22


NVD link : CVE-2024-36440

Mitre link : CVE-2024-36440

CVE.ORG link : CVE-2024-36440


JSON object : View

Products Affected

No product.

CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-759

Use of a One-Way Hash without a Salt

CWE-1393

Use of Default Password