ID CVE-2010-2468
Summary The S2 Security NetBox 2.x and 3.x, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, uses a weak hash algorithm for storing the Administrator password, which makes it easier for context-dependent attackers to obtain privileged access by recovering the cleartext of this password.
References
Vulnerable Configurations
  • cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*
    cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*
  • cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*
    cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*
  • cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*
    cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*
  • cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*
    cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*
  • cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*
    cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 17-08-2017 - 01:32)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
misc
xf netbox-admin-password-info-disclosure(59827)
Last major update 17-08-2017 - 01:32
Published 25-06-2010 - 21:30
Last modified 17-08-2017 - 01:32
Back to Top