CVE-2014-9251

Published Dec 15, 2014

Last updated 9 years ago

Overview

Description
Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413.
Source
cret@cert.org
NVD status
Analyzed

Risk scores

CVSS 2.0

Type
Primary
Base score
5
Impact score
2.9
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
CWE-255

Social media

Hype score
Not currently trending

Vendor comments

  • ZenossAddressed in 5.1.1

Configurations