Impact
A flaw exists in Vaelsys VaelsysV4 where manipulating the xajaxargs parameter in the Web interface triggers the use of a weak hash algorithm. The weakness lies in the cryptographic handling of the argument, potentially allowing an attacker to recover hash values or infer stored secrets. This can lead to leakage of sensitive information, such as user credentials or configuration data, compromising confidentiality. The vulnerability is not a direct remote code execution flaw, but it facilitates unauthorized data disclosure through insecure hashing.
Affected Systems
The issue affects Vaelsys VaelsysV4 versions up to 5.1.0 and 5.4.0, specifically the file /grid/vgrid_server.php in the Web interface component. Users running any of these releases should verify that they are not using the affected build and consider an upgrade to the patched releases.
Risk and Exploitability
The CVSS score of 2.3 indicates low overall severity, and the EPSS score of less than 1% shows a very small chance of exploitation in the wild. The vulnerability is listed as not included in the CISA KEV catalog. Although the exploit is publicly available, it requires remote manipulation of a specific HTTP argument and is considered high complexity and difficult to successfully exploit. Nonetheless, because sensitive data may be compromised, immediate patching is recommended over passive monitoring.
OpenCVE Enrichment
EUVD