static five-character password which allows an attacker to decrypt this
file. The application hashes this five-character password with
the outdated and broken MD5 algorithm (no salt) and uses the first five
bytes as the key for RC4. The configuration file is then encrypted with
these parameters.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36125 | The configuration file is encrypted with a static key derived from a static five-character password which allows an attacker to decrypt this file. The application hashes this five-character password with the outdated and broken MD5 algorithm (no salt) and uses the first five bytes as the key for RC4. The configuration file is then encrypted with these parameters. |
Solution
The vendor provides a patched version 8.30.xx.903 since May 2024 which can be downloaded from the following URL: https://www.faronics.com/document-library/document/download-winselect-standard The vendor provided the following changelog: https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes
Workaround
No workaround given by the vendor.
No history.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-02-13T17:52:55.434Z
Reserved: 2024-05-29T06:48:49.689Z
Link: CVE-2024-36496
Updated: 2024-08-02T03:37:05.067Z
Status : Awaiting Analysis
Published: 2024-06-24T09:15:09.860
Modified: 2024-11-21T09:22:17.317
Link: CVE-2024-36496
No data.
OpenCVE Enrichment
No data.
EUVD