GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-522 | |
| Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-01-22T00:00:00.000Z
Updated: 2025-02-04T18:44:05.333Z
Reserved: 2024-07-26T00:00:00.000Z
Link: CVE-2024-42012
Updated: 2025-01-22T17:27:17.027Z
Status : Awaiting Analysis
Published: 2025-01-22T16:15:29.183
Modified: 2025-02-04T19:15:31.403
Link: CVE-2024-42012
No data.