Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Aug 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-328 |
Thu, 07 Aug 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. | Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. |
Title | Use of weak hash in Gessler GmbH WEB-MASTER | Use of a Broken or Risky Cryptographic Algorithm in Gessler GmbH WEB-MASTER |
Fri, 09 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published: 2024-02-01T21:41:08.954Z
Updated: 2025-08-07T18:30:57.997Z
Reserved: 2024-01-29T15:59:59.954Z
Link: CVE-2024-1040

Updated: 2024-08-01T18:26:30.400Z

Status : Modified
Published: 2024-02-01T22:15:55.717
Modified: 2025-08-07T19:15:28.000
Link: CVE-2024-1040

No data.