GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user.
History

Tue, 04 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-522
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Jan 2025 16:00:00 +0000

Type Values Removed Values Added
Description GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-04T18:44:05.333Z

Reserved: 2024-07-26T00:00:00.000Z

Link: CVE-2024-42012

cve-icon Vulnrichment

Updated: 2025-01-22T17:27:17.027Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-22T16:15:29.183

Modified: 2025-02-04T19:15:31.403

Link: CVE-2024-42012

cve-icon Redhat

No data.