First published: Wed Jun 07 2000(Updated: )
eTrust Intrusion Detection System (formerly SessionWall-3) uses weak encryption (XOR) to store administrative passwords in the registry, which allows local users to easily decrypt the passwords.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom eTrust Intrusion Detection | <=1.4.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0559 is considered a high severity vulnerability due to the weak encryption of administrative passwords.
To fix CVE-2000-0559, update the eTrust Intrusion Detection System to a version higher than 1.4.1.13 that addresses this encryption issue.
CVE-2000-0559 affects Broadcom eTrust Intrusion Detection versions up to and including 1.4.1.13.
CVE-2000-0559 describes a vulnerability where weak XOR encryption is used to store passwords.
Yes, local users can exploit CVE-2000-0559 to easily decrypt administrative passwords stored in the registry.