GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-522 | |
Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-04T18:44:05.333Z
Reserved: 2024-07-26T00:00:00.000Z
Link: CVE-2024-42012

Updated: 2025-01-22T17:27:17.027Z

Status : Awaiting Analysis
Published: 2025-01-22T16:15:29.183
Modified: 2025-02-04T19:15:31.403
Link: CVE-2024-42012

No data.

No data.