Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords.
Metrics
Affected Vendors & Products
References
History
Fri, 04 Oct 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Planet
Planet gs-4210-24p2s Planet gs-4210-24p2s Firmware Planet gs-4210-24pl4c Planet gs-4210-24pl4c Firmware |
|
CPEs | cpe:2.3:h:planet:gs-4210-24p2s:3.0:*:*:*:*:*:*:* cpe:2.3:h:planet:gs-4210-24pl4c:2.0:*:*:*:*:*:*:* cpe:2.3:o:planet:gs-4210-24p2s_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:planet:gs-4210-24pl4c_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Planet
Planet gs-4210-24p2s Planet gs-4210-24p2s Firmware Planet gs-4210-24pl4c Planet gs-4210-24pl4c Firmware |
Mon, 30 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 30 Sep 2024 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords. | |
Title | PLANET Technology switch devices - Weak hash for users' passwords | |
Weaknesses | CWE-328 CWE-759 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-30T15:47:03.144Z
Reserved: 2024-09-05T02:53:06.043Z
Link: CVE-2024-8453

Updated: 2024-09-30T15:46:56.955Z

Status : Analyzed
Published: 2024-09-30T08:15:04.093
Modified: 2024-10-04T15:10:54.507
Link: CVE-2024-8453

No data.