The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 14 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Mar 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device. | |
| Title | Weak hashing alghrythm | |
| Weaknesses | CWE-328 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published: 2025-03-14T12:53:13.682Z
Updated: 2025-03-14T13:35:00.490Z
Reserved: 2025-03-03T13:27:07.018Z
Link: CVE-2025-27595
Updated: 2025-03-14T13:34:56.505Z
Status : Received
Published: 2025-03-14T13:15:40.763
Modified: 2025-03-14T13:15:40.763
Link: CVE-2025-27595
No data.