The device uses a weak hashing alghorithm to create the...
Critical severity
Unreviewed
Published
Mar 14, 2025
to the GitHub Advisory Database
•
Updated Mar 14, 2025
Description
Published by the National Vulnerability Database
Mar 14, 2025
Published to the GitHub Advisory Database
Mar 14, 2025
Last updated
Mar 14, 2025
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
References