First published: Wed Jun 24 2015(Updated: )
CreateBossCredentials.jar in Toshiba CHEC before 6.6 build 4014 and 6.7 before build 4329 contains a hardcoded AES key, which allows attackers to discover Back Office System Server (BOSS) DB2 database credentials by leveraging knowledge of this key in conjunction with bossinfo.pro read access.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba CHEC | <=6.6 | |
Toshiba CHEC | =6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4875 has a medium severity rating due to the potential exposure of sensitive database credentials.
To fix CVE-2014-4875, update Toshiba CHEC to version 6.7 build 4329 or later, or 6.6 build 4014 or later.
CVE-2014-4875 affects Toshiba CHEC versions prior to 6.7 build 4329 and all versions of 6.6.
CVE-2014-4875 is a vulnerability stemming from a hardcoded AES encryption key in the application.
The risks of CVE-2014-4875 include unauthorized access to Back Office System Server database credentials, compromising data security.