CVE-2024-8453

Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:planet:gs-4210-24p2s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:planet:gs-4210-24p2s:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:planet:gs-4210-24pl4c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:planet:gs-4210-24pl4c:2.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-09-30 08:15

Updated : 2024-10-04 15:10


NVD link : CVE-2024-8453

Mitre link : CVE-2024-8453

CVE.ORG link : CVE-2024-8453


JSON object : View

Products Affected

planet

  • gs-4210-24p2s
  • gs-4210-24pl4c_firmware
  • gs-4210-24p2s_firmware
  • gs-4210-24pl4c
CWE
CWE-328

Use of Weak Hash

CWE-759

Use of a One-Way Hash without a Salt