8.1
CWE
916
EPSS
0.043%
Advisory Published
Advisory Published
Updated

CVE-2024-25607

First published: Tue Feb 20 2024(Updated: )

The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes.

Credit: security@liferay.com security@liferay.com

Affected SoftwareAffected VersionHow to fix
maven/com.liferay.portal:com.liferay.portal.kernel<38.0.0
38.0.0
maven/com.liferay.portal:release.portal.bom<7.4.3.14
7.4.3.14
maven/com.liferay.portal:release.dxp.bom>=7.4.0<7.4.13.u16
7.4.13.u16
maven/com.liferay.portal:release.dxp.bom<7.2.10.fp17
7.2.10.fp17
maven/com.liferay.portal:release.dxp.bom>=7.3.0<7.3.10.u4
7.3.10.u4
Liferay DXP<7.2
Liferay DXP=7.2
Liferay DXP=7.2-fix_pack_1
Liferay DXP=7.2-fix_pack_10
Liferay DXP=7.2-fix_pack_11
Liferay DXP=7.2-fix_pack_12
Liferay DXP=7.2-fix_pack_13
Liferay DXP=7.2-fix_pack_14
Liferay DXP=7.2-fix_pack_15
Liferay DXP=7.2-fix_pack_16
Liferay DXP=7.2-fix_pack_17
Liferay DXP=7.2-fix_pack_2
Liferay DXP=7.2-fix_pack_3
Liferay DXP=7.2-fix_pack_4
Liferay DXP=7.2-fix_pack_5
Liferay DXP=7.2-fix_pack_6
Liferay DXP=7.2-fix_pack_7
Liferay DXP=7.2-fix_pack_8
Liferay DXP=7.2-fix_pack_9
Liferay DXP=7.2-service_pack_1
Liferay DXP=7.2-service_pack_2
Liferay DXP=7.2-service_pack_3
Liferay DXP=7.2-service_pack_4
Liferay DXP=7.2-service_pack_5
Liferay DXP=7.3
Liferay DXP=7.3-fix_pack_1
Liferay DXP=7.3-fix_pack_2
Liferay DXP=7.3-service_pack_1
Liferay DXP=7.3-service_pack_3
Liferay DXP=7.4
Liferay DXP=7.4-update1
Liferay DXP=7.4-update10
Liferay DXP=7.4-update11
Liferay DXP=7.4-update12
Liferay DXP=7.4-update13
Liferay DXP=7.4-update14
Liferay DXP=7.4-update15
Liferay DXP=7.4-update2
Liferay DXP=7.4-update3
Liferay DXP=7.4-update4
Liferay DXP=7.4-update5
Liferay DXP=7.4-update6
Liferay DXP=7.4-update7
Liferay DXP=7.4-update8
Liferay DXP=7.4-update9
Liferay 7.4 GA<=7.4.3.15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-25607?

    CVE-2024-25607 is classified as a medium severity vulnerability due to the low work factor used in the PBKDF2-HMAC-SHA1 password hashing algorithm.

  • How do I fix CVE-2024-25607?

    To fix CVE-2024-25607, upgrade to Liferay Portal version 7.4.3.15 or above, or Liferay DXP version 7.4 update 16, 7.3 update 4, or 7.2 fix pack 17.

  • Which versions are affected by CVE-2024-25607?

    CVE-2024-25607 affects Liferay Portal versions 7.2.0 to 7.4.3.15 and older unsupported versions, as well as Liferay DXP versions 7.4 before update 16, 7.3 before update 4, and 7.2 before fix pack 17.

  • What is the impact of exploiting CVE-2024-25607?

    Exploiting CVE-2024-25607 can allow attackers to compromise user accounts through weak password hashing.

  • Is there a workaround for CVE-2024-25607?

    A temporary workaround for CVE-2024-25607 may include enhancing password security by implementing stronger password policies or using alternative hashing algorithms until an upgrade can be completed.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203