Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-16816 | Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. |
Solution
Gessler GmbH recommends updating EZ2 to 3.2 or greater and WebMaster to 4.4 or greater to mitigate these vulnerabilities. Updates have to be applied by Gessler GmbH technicians. For more information contact Gessler GmbH https://www.gessler.de/en/contact-us/ .
Workaround
No workaround given by the vendor.
Thu, 07 Aug 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-328 |
Thu, 07 Aug 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. | Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device. |
Title | Use of weak hash in Gessler GmbH WEB-MASTER | Use of a Broken or Risky Cryptographic Algorithm in Gessler GmbH WEB-MASTER |
Fri, 09 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-07T18:30:57.997Z
Reserved: 2024-01-29T15:59:59.954Z
Link: CVE-2024-1040

Updated: 2024-08-01T18:26:30.400Z

Status : Modified
Published: 2024-02-01T22:15:55.717
Modified: 2025-08-07T19:15:28.000
Link: CVE-2024-1040

No data.

No data.