Vulnerability in the cryptographic algorithm of AndSoft's e-TMS v25.03, which uses MD5 to encrypt passwords. MD5 is a cryptographically vulnerable hash algorithm and is no longer considered secure for storing or transmitting passwords. It is vulnerable to collision attacks and can be easily cracked with modern hardware, exposing user credentials to potential risks.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms | Third Party Advisory |
Configurations
History
02 Oct 2025, 19:45
Type | Values Removed | Values Added |
---|---|---|
First Time |
Andsoft
Andsoft e-tms |
|
References | () https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tmsĀ - Third Party Advisory | |
CPE | cpe:2.3:a:andsoft:e-tms:25.03:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
02 Oct 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-02 15:15
Updated : 2025-10-02 19:45
NVD link : CVE-2025-59745
Mitre link : CVE-2025-59745
CVE.ORG link : CVE-2025-59745
JSON object : View
Products Affected
andsoft
- e-tms
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm