The E2EE password entropy generated by Rocket.Chat Mobile prior to version 4.5.1 is insufficient, allowing attackers to crack it if they have the appropriate time and resources.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://hackerone.com/reports/2546437 |
History
Mon, 07 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rocketchat
Rocketchat rocket.chat |
|
Weaknesses | CWE-1391 | |
CPEs | cpe:2.3:a:rocketchat:rocket.chat:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rocketchat
Rocketchat rocket.chat |
|
Metrics |
cvssV3_1
|
Mon, 07 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The E2EE password entropy generated by Rocket.Chat Mobile prior to version 4.5.1 is insufficient, allowing attackers to crack it if they have the appropriate time and resources. | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2024-10-07T12:46:16.115Z
Updated: 2024-10-07T14:59:56.828Z
Reserved: 2024-07-27T01:04:08.014Z
Link: CVE-2024-42027
Vulnrichment
Updated: 2024-10-07T14:57:19.440Z
NVD
Status : Awaiting Analysis
Published: 2024-10-07T13:15:15.020
Modified: 2024-10-07T19:37:18.967
Link: CVE-2024-42027
Redhat
No data.