Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to BoKS Server Agent 9.0.0.4.
Workaround
Configure the OS to use SHA512 rather than yescrypt.
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insecure defaults in the Server Agent component of Fortra's Core Privileged Access Manager (BoKS) can result in the selection of weak password hash algorithms. This issue affects BoKS Server Agent 9.0 instances that support yescrypt and are running in a BoKS 8.1 domain. | |
| Title | Weak Password Hash in Core Privileged Access Manager (BoKS) | |
| Weaknesses | CWE-916 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2025-12-16T20:23:51.768Z
Reserved: 2025-11-21T21:04:44.245Z
Link: CVE-2025-13532
Updated: 2025-12-16T20:18:54.152Z
Status : Received
Published: 2025-12-16T20:15:47.467
Modified: 2025-12-16T20:15:47.467
Link: CVE-2025-13532
No data.
OpenCVE Enrichment
No data.