The configuration file is encrypted with a static key derived from a 
static five-character password which allows an attacker to decrypt this 
file. The application hashes this five-character password with 
the outdated and broken MD5 algorithm (no salt) and uses the first five 
bytes as the key for RC4. The configuration file is then encrypted with 
these parameters.
                
            References
                    Configurations
                    No configuration.
History
                    21 Nov 2024, 09:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2024/Jun/12 - | |
| References | () https://r.sec-consult.com/winselect - | |
| References | () https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes - | 
03 Jul 2024, 02:03
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.5  | 
25 Jun 2024, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
24 Jun 2024, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-06-24 09:15
Updated : 2024-11-21 09:22
NVD link : CVE-2024-36496
Mitre link : CVE-2024-36496
CVE.ORG link : CVE-2024-36496
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
