Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash With Insufficient Computational Effort, Use of Weak Hash, Use of a One-Way Hash with a Predictable Salt vulnerability in Beta80 Life 1st allows an Attacker to Bruteforce User Passwords or find a collision to gain access to a target application using BETA80 “Life 1st Identity Manager” as a service for authentication.This issue affects Life 1st: 1.5.2.14234.
History

Wed, 19 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Mar 2025 16:00:00 +0000

Type Values Removed Values Added
Description Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash With Insufficient Computational Effort, Use of Weak Hash, Use of a One-Way Hash with a Predictable Salt vulnerability in Beta80 Life 1st allows an Attacker to Bruteforce User Passwords or find a collision to gain access to a target application using BETA80 “Life 1st Identity Manager” as a service for authentication.This issue affects Life 1st: 1.5.2.14234.
Weaknesses CWE-327
CWE-328
CWE-760
CWE-916
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ENISA

Published:

Updated: 2025-03-19T18:28:28.268Z

Reserved: 2025-02-11T08:24:51.661Z

Link: CVE-2025-26486

cve-icon Vulnrichment

Updated: 2025-03-19T18:28:24.443Z

cve-icon NVD

Status : Received

Published: 2025-03-19T16:15:31.457

Modified: 2025-03-19T16:15:31.457

Link: CVE-2025-26486

cve-icon Redhat

No data.