Broken or Risky Cryptographic Algorithm, Use of Password Hash With Insufficient Computational Effort, Use of Weak Hash, Use of a One-Way Hash with a Predictable Salt vulnerabilities in Beta80 "Life 1st Identity Manager" enable an attacker with access to password hashes to bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses "Life 1st Identity Manager" as a service for authentication. This issue affects Life 1st: 1.5.2.14234.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26486 | government resource |
https://euvd.enisa.europa.eu/vulnerability/CVE-2025-26486 | vdb entry |