First published: Fri Apr 03 2015(Updated: )
Inductive Automation Ignition 7.7.2 uses MD5 password hashes, which makes it easier for context-dependent attackers to obtain access via a brute-force attack.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Inductive Automation Ignition | =7.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0995 has been assigned a medium severity level due to its potential for password cracking via brute-force attacks.
To fix CVE-2015-0995, upgrade to a version of Inductive Automation Ignition that uses stronger password hashing algorithms instead of MD5.
CVE-2015-0995 can be exploited via brute-force attacks due to the use of weak MD5 password hashes.
CVE-2015-0995 specifically affects Inductive Automation Ignition version 7.7.2.
Leaving CVE-2015-0995 unpatched increases the risk of unauthorized access to sensitive systems through compromised password security.