An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Oct 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline. | An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline. |
Weaknesses | CWE-40 |
MITRE
Status: PUBLISHED
Assigner: Dragos
Published: 2024-01-10T20:21:51.434Z
Updated: 2024-11-14T17:23:37.514Z
Reserved: 2023-04-06T17:45:40.441Z
Link: CVE-2023-29446
Vulnrichment
Updated: 2024-08-02T14:07:46.304Z
NVD
Status : Modified
Published: 2024-01-10T21:15:08.603
Modified: 2024-11-21T07:57:04.453
Link: CVE-2023-29446
Redhat
No data.