Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash
With Insufficient Computational Effort, Use of Weak Hash, Use of a
One-Way Hash with a Predictable Salt vulnerability in Beta80 Life 1st
allows an
Attacker to Bruteforce User
Passwords or find a collision to gain access to a target application using BETA80
“Life 1st Identity Manager” as a service for authentication.This issue affects Life 1st: 1.5.2.14234.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26486 |
![]() ![]() |
History
Wed, 19 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 19 Mar 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash With Insufficient Computational Effort, Use of Weak Hash, Use of a One-Way Hash with a Predictable Salt vulnerability in Beta80 Life 1st allows an Attacker to Bruteforce User Passwords or find a collision to gain access to a target application using BETA80 “Life 1st Identity Manager” as a service for authentication.This issue affects Life 1st: 1.5.2.14234. | |
Weaknesses | CWE-327 CWE-328 CWE-760 CWE-916 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ENISA
Published:
Updated: 2025-03-19T18:28:28.268Z
Reserved: 2025-02-11T08:24:51.661Z
Link: CVE-2025-26486

Updated: 2025-03-19T18:28:24.443Z

Status : Received
Published: 2025-03-19T16:15:31.457
Modified: 2025-03-19T16:15:31.457
Link: CVE-2025-26486

No data.