Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Aug 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-328 |
Thu, 07 Aug 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. | Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. |
| Title | Use of weak hash in Gessler GmbH WEB-MASTER | Use of a Broken or Risky Cryptographic Algorithm in Gessler GmbH WEB-MASTER |
Fri, 09 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-07T18:30:57.997Z
Reserved: 2024-01-29T15:59:59.954Z
Link: CVE-2024-1040
Updated: 2024-08-01T18:26:30.400Z
Status : Modified
Published: 2024-02-01T22:15:55.717
Modified: 2025-08-07T19:15:28.000
Link: CVE-2024-1040
No data.