CVE-2019-17216

An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. Password authentication uses MD5 to hash passwords. Cracking is possible with minimal effort.
References
Link Resource
https://vuldb.com/?id.134117 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-10-06 16:15

Updated : 2024-02-04 20:39


NVD link : CVE-2019-17216

Mitre link : CVE-2019-17216

CVE.ORG link : CVE-2019-17216


JSON object : View

Products Affected

vzug

  • combi-stream_mslq
  • combi-stream_mslq_firmware
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort