Files
CVEs-PoC/2014/CVE-2014-4623.md
T
2024-06-18 02:51:15 +02:00

18 lines
808 B
Markdown

### [CVE-2014-4623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4623)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
### POC
#### Reference
- http://packetstormsecurity.com/files/128842/EMC-Avamar-Weak-Password-Storage.html
#### Github
No PoCs found on GitHub currently.