EzGED3 3.5.0 stores user passwords using an insecure hashing scheme: md5(md5(password)). This hashing method is cryptographically weak and allows attackers to perform efficient offline brute-force attacks if password hashes are disclosed. The lack of salting and use of a fast, outdated algorithm makes it feasible to recover plaintext credentials using precomputed tables or GPU-based cracking tools. The vendor states that the issue is fixed in 3.5.72.27183.
                
            References
                    Configurations
                    No configuration.
History
                    20 Aug 2025, 14:40
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
19 Aug 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-260 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.3 | 
19 Aug 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-19 16:15
Updated : 2025-08-20 14:40
NVD link : CVE-2025-51540
Mitre link : CVE-2025-51540
CVE.ORG link : CVE-2025-51540
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-260
                        
            Password in Configuration File
