First published: Wed May 26 2021(Updated: )
In Versa Director, Versa Analytics and VOS, Passwords are not hashed using an adaptive cryptographic hash function or key derivation function prior to storage. Popular hashing algorithms based on the Merkle-Damgardconstruction (such as MD5 and SHA-1) alone are insufficient in thwarting password cracking. Attackers can generate and use precomputed hashes for all possible password character combinations (commonly referred to as "rainbow tables") relatively quickly. The use of adaptive hashing algorithms such asscryptorbcryptor Key-Derivation Functions (i.e.PBKDF2) to hash passwords make generation of such rainbow tables computationally infeasible.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Versa Networks Versa Analytics | ||
Versa Networks Versa Director | ||
Versa Networks Versa Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-25030 has a high severity due to the inadequate password storage mechanisms that can lead to unauthorized access.
To fix CVE-2019-25030, implement a secure password hashing algorithm that uses an adaptive cryptographic hash function.
CVE-2019-25030 affects various versions of Versa Analytics, Versa Director, and the Versa Operating System.
The risks associated with CVE-2019-25030 include potential exposure of user passwords and unauthorized account access.
While there are no confirmed reports of exploitation for CVE-2019-25030, its vulnerabilities make it a likely target for attackers.