First published: Fri Jun 24 2016(Updated: )
SolarWinds Virtualization Manager 6.3.1 and earlier uses weak encryption to store passwords in /etc/shadow, which allows local users with superuser privileges to obtain user passwords via a brute force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Virtualization Manager | <=6.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5709 has a high severity rating due to the weak encryption of passwords in SolarWinds Virtualization Manager.
To fix CVE-2016-5709, upgrade SolarWinds Virtualization Manager to version 6.3.2 or later that addresses the weak encryption issue.
End users of SolarWinds Virtualization Manager versions 6.3.1 and earlier are affected by CVE-2016-5709.
CVE-2016-5709 can be exploited through a brute force attack by local users with superuser privileges.
The primary vulnerability in CVE-2016-5709 lies in the weak encryption used to store passwords in the /etc/shadow file.