The application uses an insecure hashing algorithm (MD5) to hash passwords. If an attacker obtained a copy of these hashes, either through exploiting cloud services, performing TLS downgrade attacks on the traffic from a mobile device, or through another means, they may be able to crack the hash in a reasonable amount of time and gain unauthorized access to the victim's account.
History

Thu, 11 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-327
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description The application uses an insecure hashing algorithm (MD5) to hash passwords. If an attacker obtained a copy of these hashes, either through exploiting cloud services, performing TLS downgrade attacks on the traffic from a mobile device, or through another means, they may be able to crack the hash in a reasonable amount of time and gain unauthorized access to the victim's account.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-10T00:00:00.000Z

Updated: 2025-12-11T15:58:15.250Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65831

cve-icon Vulnrichment

Updated: 2025-12-11T15:57:40.357Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T21:16:08.913

Modified: 2025-12-12T15:18:13.390

Link: CVE-2025-65831

cve-icon Redhat

No data.