First published: Tue Feb 20 2024(Updated: )
Internet passwords stored in Person documents in the Domino® Directory created using the "Add Person" action on the People & Groups tab in the Domino® Administrator are secured using a cryptographically weak hash algorithm. This could enable attackers with access to the hashed value to determine a user's password, e.g. using a brute force attack. This issue does not impact Person documents created through user registration https://help.hcltechsw.com/domino/10.0.1/admin/conf_userregistration_c.html .
Credit: psirt@hcl.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Domino |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37495 has been classified as a medium severity vulnerability.
To fix CVE-2023-37495, update to the latest version of HCL Domino that addresses the weak hash algorithm.
The risks associated with CVE-2023-37495 include potential unauthorized access to sensitive password information due to the cryptographic weakness.
Organizations using HCL Domino that have stored passwords in Person documents are affected by CVE-2023-37495.
CVE-2023-37495 requires access to the hashed values, so exploitation typically requires network access or physical access to the affected systems.