The configuration file is encrypted with a static key derived from a
static five-character password which allows an attacker to decrypt this
file. The application hashes this five-character password with
the outdated and broken MD5 algorithm (no salt) and uses the first five
bytes as the key for RC4. The configuration file is then encrypted with
these parameters.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-36125 The configuration file is encrypted with a static key derived from a static five-character password which allows an attacker to decrypt this file. The application hashes this five-character password with the outdated and broken MD5 algorithm (no salt) and uses the first five bytes as the key for RC4. The configuration file is then encrypted with these parameters.
Fixes

Solution

The vendor provides a patched version 8.30.xx.903 since May 2024 which can be downloaded from the following URL: https://www.faronics.com/document-library/document/download-winselect-standard   The vendor provided the following changelog: https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-02-13T17:52:55.434Z

Reserved: 2024-05-29T06:48:49.689Z

Link: CVE-2024-36496

cve-icon Vulnrichment

Updated: 2024-08-02T03:37:05.067Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-24T09:15:09.860

Modified: 2024-11-21T09:22:17.317

Link: CVE-2024-36496

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.