CWE-916

Use of Password Hash With Insufficient Computational Effort

The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.

CVE-2014-2354 (GCVE-0-2014-2354)

Vulnerability from cvelistv5 – Published: 2014-05-30 23:00 – Updated: 2025-10-03 16:34
VLAI?
Summary
Cogent DataHub before 7.3.5 does not use a salt during password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
Cogent DataHub Affected: 0 , < 7.3.5 (custom)
Create a notification for this product.
Credits
Alain Homewood
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:14:25.313Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DataHub",
          "vendor": "Cogent",
          "versions": [
            {
              "lessThan": "7.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Alain Homewood"
        }
      ],
      "datePublic": "2014-05-29T06:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\n\n\nCogent DataHub before 7.3.5 does not use a salt during password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.\n\n\u003c/p\u003e"
            }
          ],
          "value": "Cogent DataHub before 7.3.5 does not use a salt during password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
        }
      ],
      "metrics": [
        {
          "cvssV2_0": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-03T16:34:03.154Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-149-02"
        },
        {
          "url": "http://cogentdatahub.com/Download_Software.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eCogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://cogentdatahub.com/Download_Software.html\"\u003ehttp://cogentdatahub.com/Download_Software.html\u003c/a\u003e\u003c/p\u003eCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://crackstation.net/\"\u003ehttps://crackstation.net/\u003c/a\u003e.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Cogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\n\n\n http://cogentdatahub.com/Download_Software.html \n\nCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as:  https://crackstation.net/ ."
        }
      ],
      "source": {
        "advisory": "ICSA-14-149-02",
        "discovery": "EXTERNAL"
      },
      "title": "Cogent DataHub Use of Password Hash With Insufficient Computational Effort",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2014-2352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to read arbitrary files of unspecified types, or cause a web-server denial of service, via a crafted pathname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02",
              "refsource": "MISC",
              "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2014-2354",
    "datePublished": "2014-05-30T23:00:00",
    "dateReserved": "2014-03-13T00:00:00",
    "dateUpdated": "2025-10-03T16:34:03.154Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-10618 (GCVE-0-2018-10618)

Vulnerability from cvelistv5 – Published: 2018-08-01 18:00 – Updated: 2024-09-16 19:31
VLAI?
Summary
Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
Severity ?
No CVSS data available.
CWE
  • CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916
Assigner
References
Impacted products
Vendor Product Version
Davolink DVW-3200N Affected: all version prior to Version 1.00.06
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:46:46.120Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "104940",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/104940"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01"
          },
          {
            "name": "45076",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/45076/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "DVW-3200N",
          "vendor": "Davolink",
          "versions": [
            {
              "status": "affected",
              "version": "all version prior to Version 1.00.06"
            }
          ]
        }
      ],
      "datePublic": "2018-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-08-03T09:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "104940",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/104940"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01"
        },
        {
          "name": "45076",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/45076/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-07-31T00:00:00",
          "ID": "CVE-2018-10618",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "DVW-3200N",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "all version prior to Version 1.00.06"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Davolink"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "104940",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/104940"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-01"
            },
            {
              "name": "45076",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/45076/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-10618",
    "datePublished": "2018-08-01T18:00:00Z",
    "dateReserved": "2018-05-01T00:00:00",
    "dateUpdated": "2024-09-16T19:31:23.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-13811 (GCVE-0-2018-13811)

Vulnerability from cvelistv5 – Published: 2018-12-13 16:00 – Updated: 2024-08-05 09:14
VLAI?
Summary
A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions < V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known.
Severity ?
No CVSS data available.
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Assigner
References
Impacted products
Vendor Product Version
Siemens AG SIMATIC STEP 7 (TIA Portal) Affected: SIMATIC STEP 7 (TIA Portal) : All Versions < V15.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T09:14:47.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf"
          },
          {
            "name": "105926",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105926"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SIMATIC STEP 7 (TIA Portal)",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "SIMATIC STEP 7 (TIA Portal) : All Versions \u003c V15.1"
            }
          ]
        }
      ],
      "datePublic": "2018-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions \u003c V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916: Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-14T10:57:02",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf"
        },
        {
          "name": "105926",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105926"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "productcert@siemens.com",
          "ID": "CVE-2018-13811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SIMATIC STEP 7 (TIA Portal)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "SIMATIC STEP 7 (TIA Portal) : All Versions \u003c V15.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Siemens AG"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions \u003c V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916: Use of Password Hash With Insufficient Computational Effort"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-621493.pdf"
            },
            {
              "name": "105926",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105926"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2018-13811",
    "datePublished": "2018-12-13T16:00:00",
    "dateReserved": "2018-07-10T00:00:00",
    "dateUpdated": "2024-08-05T09:14:47.273Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-15717 (GCVE-0-2018-15717)

Vulnerability from cvelistv5 – Published: 2018-12-12 19:00 – Updated: 2024-09-17 00:26
VLAI?
Summary
Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes.
Severity ?
No CVSS data available.
CWE
  • CWE-916 - Passwords stored as MD5 hashes
Assigner
References
Impacted products
Vendor Product Version
Open Dental Open Dental Affected: 18.3 and below
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:01:54.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/research/tra-2018-44"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Open Dental",
          "vendor": "Open Dental",
          "versions": [
            {
              "status": "affected",
              "version": "18.3 and below"
            }
          ]
        }
      ],
      "datePublic": "2018-12-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Passwords stored as MD5 hashes",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-12T18:57:01",
        "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
        "shortName": "tenable"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tenable.com/security/research/tra-2018-44"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vulnreport@tenable.com",
          "DATE_PUBLIC": "2018-12-12T00:00:00",
          "ID": "CVE-2018-15717",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Open Dental",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "18.3 and below"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Open Dental"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916 Passwords stored as MD5 hashes"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tenable.com/security/research/tra-2018-44",
              "refsource": "MISC",
              "url": "https://www.tenable.com/security/research/tra-2018-44"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
    "assignerShortName": "tenable",
    "cveId": "CVE-2018-15717",
    "datePublished": "2018-12-12T19:00:00Z",
    "dateReserved": "2018-08-22T00:00:00",
    "dateUpdated": "2024-09-17T00:26:20.760Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-10040 (GCVE-0-2020-10040)

Vulnerability from cvelistv5 – Published: 2020-07-14 13:18 – Updated: 2024-08-04 10:50
VLAI?
Summary
A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text.
Severity ?
No CVSS data available.
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Assigner
References
Impacted products
Vendor Product Version
Siemens AG SICAM MMU Affected: All versions < V2.05
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:50:57.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SICAM MMU",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "All versions \u003c V2.05"
            }
          ]
        },
        {
          "product": "SICAM SGU",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "product": "SICAM T",
          "vendor": "Siemens AG",
          "versions": [
            {
              "status": "affected",
              "version": "All versions \u003c V2.18"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in SICAM MMU (All versions \u003c V2.05), SICAM SGU (All versions), SICAM T (All versions \u003c V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916: Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-14T13:18:04",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "productcert@siemens.com",
          "ID": "CVE-2020-10040",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SICAM MMU",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions \u003c V2.05"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SICAM SGU",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SICAM T",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions \u003c V2.18"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Siemens AG"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability has been identified in SICAM MMU (All versions \u003c V2.05), SICAM SGU (All versions), SICAM T (All versions \u003c V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916: Use of Password Hash With Insufficient Computational Effort"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf",
              "refsource": "MISC",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2020-10040",
    "datePublished": "2020-07-14T13:18:04",
    "dateReserved": "2020-03-04T00:00:00",
    "dateUpdated": "2024-08-04T10:50:57.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12069 (GCVE-0-2020-12069)

Vulnerability from cvelistv5 – Published: 2022-12-26 00:00 – Updated: 2025-04-14 16:17
VLAI?
Summary
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Assigner
Impacted products
Vendor Product Version
CODESYS CODESYS V3 containing the CmpUserMgr Affected: V3 , < V3.5.16.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:48:58.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download="
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2021-061/"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-031/"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-022/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-12069",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-14T16:17:42.834492Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-14T16:17:54.368Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CODESYS V3  containing the CmpUserMgr",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "V3.5.16.0",
              "status": "affected",
              "version": "V3",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device."
            }
          ],
          "value": "In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-15T05:40:17.087Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download="
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2021-061/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2022-031/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2022-022/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS V3 prone to Inadequate Password Hashing",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-12069",
    "datePublished": "2022-12-26T00:00:00.000Z",
    "dateReserved": "2020-04-22T00:00:00.000Z",
    "dateUpdated": "2025-04-14T16:17:54.368Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-14389 (GCVE-0-2020-14389)

Vulnerability from cvelistv5 – Published: 2020-11-17 00:00 – Updated: 2024-08-04 12:46
VLAI?
Summary
It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
n/a keycloak Affected: before version 12.0.0
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:46:34.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875843%2C"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "keycloak",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 12.0.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-07T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875843%2C"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2020-14389",
    "datePublished": "2020-11-17T00:00:00",
    "dateReserved": "2020-06-17T00:00:00",
    "dateUpdated": "2024-08-04T12:46:34.090Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-14512 (GCVE-0-2020-14512)

Vulnerability from cvelistv5 – Published: 2020-08-25 13:20 – Updated: 2024-09-17 03:07
VLAI?
Summary
GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords.
CWE
  • CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916
Assigner
References
Impacted products
Vendor Product Version
Secomea GateManager Affected: All versions prior to 9.2c , < 9.2c (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:46:34.682Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GateManager",
          "vendor": "Secomea",
          "versions": [
            {
              "lessThan": "9.2c",
              "status": "affected",
              "version": "All versions prior to 9.2c",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-07-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-25T13:20:49",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01"
        }
      ],
      "source": {
        "defect": [
          "ICSA-20-210-01"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2020-07-28T00:00:00.000Z",
          "ID": "CVE-2020-14512",
          "STATE": "PUBLIC",
          "TITLE": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GateManager",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "All versions prior to 9.2c",
                            "version_value": "9.2c"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Secomea"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GateManager versions prior to 9.2c, The affected product uses a weak hash type, which may allow an attacker to view user passwords."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-210-01"
            }
          ]
        },
        "source": {
          "defect": [
            "ICSA-20-210-01"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-14512",
    "datePublished": "2020-08-25T13:20:49.817727Z",
    "dateReserved": "2020-06-19T00:00:00",
    "dateUpdated": "2024-09-17T03:07:15.578Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-14516 (GCVE-0-2020-14516)

Vulnerability from cvelistv5 – Published: 2021-03-18 17:55 – Updated: 2024-08-04 12:46
VLAI?
Summary
In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.
Severity ?
No CVSS data available.
CWE
  • CWE-916 - USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916
Assigner
References
Impacted products
Vendor Product Version
n/a Rockwell Automation FactoryTalk Services Platform Affected: v6.10.00, v6.11.00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:46:34.618Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Rockwell Automation FactoryTalk Services Platform",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "v6.10.00, v6.11.00"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-18T17:55:55",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2020-14516",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Rockwell Automation FactoryTalk Services Platform",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "v6.10.00, v6.11.00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-14516",
    "datePublished": "2021-03-18T17:55:55",
    "dateReserved": "2020-06-19T00:00:00",
    "dateUpdated": "2024-08-04T12:46:34.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-16231 (GCVE-0-2020-16231)

Vulnerability from cvelistv5 – Published: 2022-05-19 17:21 – Updated: 2025-04-16 17:54
VLAI?
Summary
The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.
CWE
  • CWE-916 - Use of Password Hash With Insufficient Computational Effort
Assigner
References
Impacted products
Vendor Product Version
Bachmann Electronic, GmbH M1 Hardware Controller MX207 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MX213 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MX220 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MC206 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MC212 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MC220 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MH230 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MC205 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MC210 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MH212 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller ME203 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller CS200 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MP213 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MP226 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MPC240 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MPC265 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MPC270 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MPC293 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller MPE270 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
    Bachmann Electronic, GmbH M1 Hardware Controller CPC210 Affected: MSYS v1.06.14 , < All* (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:37:54.211Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-16231",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T17:29:07.347671Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-16T17:54:00.512Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "M1 Hardware Controller MX207",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MX213",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MX220",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC206",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC212",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC220",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MH230",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC205",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MC210",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MH212",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller ME203",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller CS200",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MP213",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MP226",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC240",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC265",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC270",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPC293",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller MPE270",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "M1 Hardware Controller CPC210",
          "vendor": "Bachmann Electronic, GmbH",
          "versions": [
            {
              "lessThan": "All*",
              "status": "affected",
              "version": "MSYS v1.06.14",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-19T17:21:37.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02"
        }
      ],
      "source": {
        "advisory": "ICSA-21-026-02",
        "discovery": "UNKNOWN"
      },
      "title": "All Bachmann M1 System Processor Modules - Use of Password Hash with Insufficient Computational Effort",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2020-16231",
          "STATE": "PUBLIC",
          "TITLE": "All Bachmann M1 System Processor Modules - Use of Password Hash with Insufficient Computational Effort"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "M1 Hardware Controller MX207",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MX213",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MX220",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC206",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC212",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC220",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MH230",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC205",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MC210",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MH212",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller ME203",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller CS200",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MP213",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MP226",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC240",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC265",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC270",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPC293",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller MPE270",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "M1 Hardware Controller CPC210",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_name": "All",
                            "version_value": "MSYS v1.06.14"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bachmann Electronic, GmbH"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-916 Use of Password Hash With Insufficient Computational Effort"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02",
              "refsource": "MISC",
              "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-026-02"
            }
          ]
        },
        "source": {
          "advisory": "ICSA-21-026-02",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-16231",
    "datePublished": "2022-05-19T17:21:37.000Z",
    "dateReserved": "2020-07-31T00:00:00.000Z",
    "dateUpdated": "2025-04-16T17:54:00.512Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Mitigation ID: MIT-51

Phase: Architecture and Design

Description:

  • Use an adaptive hash function that can be configured to change the amount of computational effort needed to compute the hash, such as the number of iterations ("stretching") or the amount of memory required. Some hash functions perform salting automatically. These functions can significantly increase the overhead for a brute force attack compared to intentionally-fast functions such as MD5. For example, rainbow table attacks can become infeasible due to the high computing overhead. Finally, since computing power gets faster and cheaper over time, the technique can be reconfigured to increase the workload without forcing an entire replacement of the algorithm in use.
  • Some hash functions that have one or more of these desired properties include bcrypt [REF-291], scrypt [REF-292], and PBKDF2 [REF-293]. While there is active debate about which of these is the most effective, they are all stronger than using salts with hash functions with very little computing overhead.
  • Note that using these functions can have an impact on performance, so they require special consideration to avoid denial-of-service attacks. However, their configurability provides finer control over how much CPU and memory is used, so it could be adjusted to suit the environment's needs.
Mitigation ID: MIT-25

Phases: Implementation, Architecture and Design

Description:

  • When using industry-approved techniques, use them correctly. Don't cut corners by skipping resource-intensive steps (CWE-325). These steps are often essential for preventing common attacks.
CAPEC-55: Rainbow Table Password Cracking

An attacker gets access to the database table where hashes of passwords are stored. They then use a rainbow table of pre-computed hash chains to attempt to look up the original password. Once the original password corresponding to the hash is obtained, the attacker uses the original password to gain access to the system.

Back to CWE stats page