GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-522 | |
| Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-04T18:44:05.333Z
Reserved: 2024-07-26T00:00:00.000Z
Link: CVE-2024-42012
Updated: 2025-01-22T17:27:17.027Z
Status : Awaiting Analysis
Published: 2025-01-22T16:15:29.183
Modified: 2025-02-04T19:15:31.403
Link: CVE-2024-42012
No data.
OpenCVE Enrichment
No data.