Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
History

Thu, 07 Aug 2025 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-328

Thu, 07 Aug 2025 18:45:00 +0000

Type Values Removed Values Added
Description Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
Title Use of weak hash in Gessler GmbH WEB-MASTER Use of a Broken or Risky Cryptographic Algorithm in Gessler GmbH WEB-MASTER

Fri, 09 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2024-02-01T21:41:08.954Z

Updated: 2025-08-07T18:30:57.997Z

Reserved: 2024-01-29T15:59:59.954Z

Link: CVE-2024-1040

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.400Z

cve-icon NVD

Status : Modified

Published: 2024-02-01T22:15:55.717

Modified: 2025-08-07T19:15:28.000

Link: CVE-2024-1040

cve-icon Redhat

No data.