Cogent DataHub before 7.3.5 does not use a salt during password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Fixes

Solution

Cogent Real-Time Systems, Inc. has produced a new version of the Cogent DataHub application, Version 7.3.5, that fixes three of the four identified vulnerabilities. The updated version is available at the following address: http://cogentdatahub.com/Download_Software.html Cogent has indicated that it will not be fixing the cryptographic weaknesses of hashed usernames and passwords because of compatibility issues with existing systems. Cogent and the researcher agree that an effective mitigation strategy for users is to select sufficiently strong passwords. Cogent has indicated that password hashes can be checked for strength using sites such as: https://crackstation.net/ .


Workaround

No workaround given by the vendor.

History

Fri, 03 Oct 2025 16:45:00 +0000

Type Values Removed Values Added
Title Cogent DataHub Use of Password Hash With Insufficient Computational Effort
Weaknesses CWE-916
References
Metrics cvssV2_0

{'score': 5.0, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N'}

cvssV2_0

{'score': 6, 'vector': 'AV:L/AC:H/Au:S/C:C/I:C/A:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-03T16:34:03.154Z

Reserved: 2014-03-13T00:00:00

Link: CVE-2014-2354

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-05-30T23:55:02.987

Modified: 2025-10-03T17:15:45.460

Link: CVE-2014-2354

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.