First published: Mon Apr 21 2014(Updated: )
The default configuration of IBM 4690 OS, as used in Toshiba Global Commerce Solutions 4690 POS and other products, hashes passwords with the ADXCRYPT algorithm, which makes it easier for context-dependent attackers to obtain sensitive information via unspecified cryptanalysis of an ADXCSOUF.DAT file.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba 4690 Point Of Sale Operating System | =6.2 | |
Toshiba 4690 Point Of Sale Operating System | =6.3 | |
Toshiba 4690 Point Of Sale Operating System | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0361 is considered to have moderate severity due to the ease of cryptanalysis allowing attackers to potentially obtain sensitive information.
To fix CVE-2014-0361, upgrade to a version of the Toshiba 4690 Point of Sale Operating System that employs a stronger password hashing algorithm.
CVE-2014-0361 affects the Toshiba 4690 Point Of Sale Operating System versions 6.2, 6.3, and 6.4.
CVE-2014-0361 allows for context-dependent attackers to perform cryptanalysis on password hashes stored in the ADXCSOUF.DAT file.
Yes, newer versions of the Toshiba 4690 Point Of Sale Operating System have addressed the vulnerability by using more secure password hashing mechanisms.