CVE-2016-2379
 
Severity Score
8.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.
El protocolo Mxit utiliza cifrado débil al cifrar contraseñas de usuario, lo que podría permitir a atacantes (1) Descifrar contraseñas hash aprovechando el conocimiento de los códigos de registro del cliente u (2) obtener acceso de acceso por escuchas en los mensajes de inicio de sesión y volver a utilizar las contraseñas hash.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2016-02-12 CVE Reserved
- 2017-01-17 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-326: Inadequate Encryption Strength
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/91335 | Third Party Advisory | |
http://www.talosintelligence.com/reports/TALOS-2016-0122 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://pidgin.im/news/security/?id=95 | 2017-04-10 | |
https://security.gentoo.org/glsa/201701-38 | 2017-04-10 |