CVE-2023-0452

Econolite EOS versions prior to 3.2.23 use a weak hash algorithm for encrypting privileged user credentials. A configuration file that is accessible without authentication uses MD5 hashes for encrypting credentials, including those of administrators and technicians.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:econolite:eos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:37

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 9.8

20 Jun 2023, 16:15

Type Values Removed Values Added
CWE CWE-327 CWE-328
Summary All versions of Econolite EOS traffic control software are vulnerable to CWE-328: Use of Weak Hash, and use a weak hash algorithm for encrypting privileged user credentials. A configuration file that is accessible without authentication uses MD5 hashes for encrypting credentials, including those of administrators and technicians. Econolite EOS versions prior to 3.2.23 use a weak hash algorithm for encrypting privileged user credentials. A configuration file that is accessible without authentication uses MD5 hashes for encrypting credentials, including those of administrators and technicians.

Information

Published : 2023-01-26 21:18

Updated : 2024-11-21 07:37


NVD link : CVE-2023-0452

Mitre link : CVE-2023-0452

CVE.ORG link : CVE-2023-0452


JSON object : View

Products Affected

econolite

  • eos
CWE
CWE-328

Use of Weak Hash

CWE-327

Use of a Broken or Risky Cryptographic Algorithm