Vulnerabilities (CVE)

Filtered by CWE-326
Total 433 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-12702 1 Coolkit 1 Ewelink 2024-11-21 2.1 LOW 4.6 MEDIUM
Weak encryption in the Quick Pairing mode in the eWeLink mobile application (Android application V4.9.2 and earlier, iOS application V4.9.1 and earlier) allows physically proximate attackers to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during the pairing process.
CVE-2020-11735 1 Wolfssl 1 Wolfssl 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
The private-key operations in ecc.c in wolfSSL before 4.4.0 do not use a constant-time modular inverse when mapping to affine coordinates, aka a "projective coordinates leak."
CVE-2020-11719 1 Bilanc 1 Bilanc 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and possibly below. It relies on broken encryption with a weak and guessable static encryption key.
CVE-2020-11684 1 Linux4sam 1 At91bootstrap 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
AT91bootstrap before 3.9.2 does not properly wipe encryption and authentication keys from memory before passing control to a less privileged software component. This can be exploited to disclose these keys and subsequently encrypt and sign the next boot stage (such as the bootloader).
CVE-2020-10866 2 Avast, Microsoft 2 Antivirus, Windows 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC.
CVE-2020-10636 1 Emerson 1 Openenterprise Scada Server 2024-11-21 5.0 MEDIUM 6.5 MEDIUM
Inadequate encryption may allow the passwords for Emerson OpenEnterprise versions through 3.3.4 user accounts to be obtained.
CVE-2020-10377 1 Mitel 2 Mivoice Connect, Mivoice Connect Client 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
A weak encryption vulnerability in Mitel MiVoice Connect Client before 214.100.1214.0 could allow an unauthenticated attacker to gain access to user credentials. A successful exploit could allow an attacker to access the system with compromised user credentials.
CVE-2020-10275 3 Easyrobotics, Mobile-industrial-robots, Uvd-robots 20 Er-flex, Er-flex Firmware, Er-lite and 17 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
CVE-2020-10244 1 Jpaseto Project 1 Jpaseto 2024-11-21 5.0 MEDIUM 7.5 HIGH
JPaseto before 0.3.0 generates weak hashes when using v2.local tokens.
CVE-2020-10125 1 Ncr 2 Aptra Xfs, Selfserv Atm 2024-11-21 4.6 MEDIUM 7.6 HIGH
NCR SelfServ ATMs running APTRA XFS 04.02.01 and 05.01.00 implement 512-bit RSA certificates to validate bunch note acceptor (BNA) software updates, which can be broken by an attacker with physical access in a sufficiently short period of time, thereby enabling the attacker to sign arbitrary files and CAB archives used to update BNA software, as well as bypass application whitelisting, resulting in the ability to execute arbitrary code.
CVE-2020-0407 1 Google 1 Android 2024-11-21 2.1 LOW 4.4 MEDIUM
In various functions in fscrypt_ice.c and related files in some implementations of f2fs encryption that use encryption hardware which only supports 32-bit IVs (Initialization Vectors), 64-bit IVs are used and later are truncated to 32 bits. This may cause IV reuse and thus weakened disk encryption. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153450752References: N/A
CVE-2019-9863 1 Abus 6 Secvest Wireless Alarm System Fuaa50000, Secvest Wireless Alarm System Fuaa50000 Firmware, Secvest Wireless Remote Control Fube50014 and 3 more 2024-11-21 10.0 HIGH 9.8 CRITICAL
Due to the use of an insecure algorithm for rolling codes in the ABUS Secvest wireless alarm system FUAA50000 3.01.01 and its remote controls FUBE50014 and FUBE50015, an attacker is able to predict valid future rolling codes, and can thus remotely control the alarm system in an unauthorized way.
CVE-2019-9483 1 Amazon 2 Ring Video Doorbell, Ring Video Doorbell Firmware 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
Amazon Ring Doorbell before 3.4.7 mishandles encryption, which allows attackers to obtain audio and video data, or insert spoofed video that does not correspond to the actual person at the door.
CVE-2019-9399 1 Google 1 Android 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
The Print Service is susceptible to man in the middle attacks due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-115635664
CVE-2019-8919 1 Seafile 1 Seadroid 2024-11-21 5.0 MEDIUM 7.5 HIGH
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2019-7649 1 Cmswing 1 Cmswing 2024-11-21 5.0 MEDIUM 7.5 HIGH
global.encryptPassword in bootstrap/global.js in CMSWing 1.3.7 relies on multiple MD5 operations for password hashing.
CVE-2019-7648 1 Hotels Server Project 1 Hotels Server 2024-11-21 5.0 MEDIUM 7.5 HIGH
controller/fetchpwd.php and controller/doAction.php in Hotels_Server through 2018-11-05 rely on base64 in an attempt to protect password storage.
CVE-2019-6972 1 Tp-link 2 Tl-wr1043nd, Tl-wr1043nd Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the "Authorization" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the username is cleartext, and the password is hashed with the MD5 algorithm (after decoding of the URL encoded string with base64).
CVE-2019-6481 1 Abine 1 Blur 2024-11-21 5.0 MEDIUM 7.5 HIGH
Abine Blur 7.8.2431 allows remote attackers to conduct "Second-Factor Auth Bypass" attacks by using the "Perform a right-click operation to access a forgotten dev menu to insert user passwords that otherwise would require the user to accept a second-factor request in a mobile app." approach, related to a "Multifactor Auth Bypass, Full Disk Encryption Bypass" issue affecting the Affected Chrome Plugin component.
CVE-2019-5723 1 Portier 1 Portier 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in portier vision 4.4.4.2 and 4.4.4.6. Passwords are stored using reversible encryption rather than as a hash value, and the used Vigenere algorithm is badly outdated. Moreover, the encryption key is static and too short. Due to this, the passwords stored by the application can be easily decrypted.