CVE-2019-17216

An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. Password authentication uses MD5 to hash passwords. Cracking is possible with minimal effort.
References
Link Resource
https://vuldb.com/?id.134117 Permissions Required Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*

Information

Published : 2019-10-06 09:15

Updated : 2020-08-24 10:37


NVD link : CVE-2019-17216

Mitre link : CVE-2019-17216


JSON object : View

CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort

Advertisement

dedicated server usa

Products Affected

vzug

  • combi-stream_mslq_firmware
  • combi-stream_mslq