ID CVE-2022-26307
Summary LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.
References
Vulnerable Configurations
  • cpe:2.3:a:libreoffice:libreoffice:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:libreoffice:libreoffice:7.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libreoffice:libreoffice:7.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:libreoffice:libreoffice:7.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libreoffice:libreoffice:7.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:libreoffice:libreoffice:7.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libreoffice:libreoffice:7.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:libreoffice:libreoffice:7.3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 11-07-2023 - 14:35
Published 25-07-2022 - 15:15
Last modified 11-07-2023 - 14:35
Back to Top