First published: Wed Jan 20 2021(Updated: )
Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Fsm-2500 Firmware | <=5.2 | |
Bosch FSM-2500 | ||
Bosch Fsm-5000 Firmware | <=5.2 | |
Bosch FSM-5000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6780 is a vulnerability that allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plaintext passwords on Bosch FSM-2500 and FSM-5000 servers up to and including version 5.2.
CVE-2020-6780 has a severity rating of 4.9 (medium).
Bosch FSM-2500 servers and Bosch FSM-5000 servers up to and including version 5.2 are affected by CVE-2020-6780.
An attacker with admin privileges can exploit CVE-2020-6780 to dump the credentials of other users and possibly recover their plaintext passwords by using insufficient computational effort in the password hash.
No, Bosch FSM-2500 is not vulnerable to CVE-2020-6780.
No, Bosch FSM-5000 is not vulnerable to CVE-2020-6780.
To fix CVE-2020-6780, update Bosch FSM-2500 server and Bosch FSM-5000 server to a version higher than 5.2.