Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords.
Solution:
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-8055-2c361-1.html | third party advisory |
https://www.twcert.org.tw/en/cp-139-8056-09688-2.html | third party advisory |