Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-16816 Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
Fixes

Solution

Gessler GmbH recommends updating EZ2 to 3.2 or greater and WebMaster to 4.4 or greater to mitigate these vulnerabilities. Updates have to be applied by Gessler GmbH technicians. For more information contact Gessler GmbH https://www.gessler.de/en/contact-us/ .


Workaround

No workaround given by the vendor.

History

Thu, 07 Aug 2025 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-328

Thu, 07 Aug 2025 18:45:00 +0000

Type Values Removed Values Added
Description Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
Title Use of weak hash in Gessler GmbH WEB-MASTER Use of a Broken or Risky Cryptographic Algorithm in Gessler GmbH WEB-MASTER

Fri, 09 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-08-07T18:30:57.997Z

Reserved: 2024-01-29T15:59:59.954Z

Link: CVE-2024-1040

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.400Z

cve-icon NVD

Status : Modified

Published: 2024-02-01T22:15:55.717

Modified: 2025-08-07T19:15:28.000

Link: CVE-2024-1040

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.