The application uses an insecure hashing algorithm (MD5) to hash passwords. If an attacker obtained a copy of these hashes, either through exploiting cloud services, performing TLS downgrade attacks on the traffic from a mobile device, or through another means, they may be able to crack the hash in a reasonable amount of time and gain unauthorized access to the victim's account.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-327 | |
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The application uses an insecure hashing algorithm (MD5) to hash passwords. If an attacker obtained a copy of these hashes, either through exploiting cloud services, performing TLS downgrade attacks on the traffic from a mobile device, or through another means, they may be able to crack the hash in a reasonable amount of time and gain unauthorized access to the victim's account. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-10T00:00:00.000Z
Updated: 2025-12-11T15:58:15.250Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65831
Updated: 2025-12-11T15:57:40.357Z
Status : Awaiting Analysis
Published: 2025-12-10T21:16:08.913
Modified: 2025-12-12T15:18:13.390
Link: CVE-2025-65831
No data.