CVE-2022-21800
18.02.2022, 18:15
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. As a result, attackers may be able to crack the hashed passwords.Enginsight
Vendor | Product | Version |
---|---|---|
airspan | mimosa_management_platform | 𝑥 < 1.0.3 |
airspan | c6x_firmware | 𝑥 < 2.8.6.1 |
airspan | c5x_firmware | 𝑥 < 2.8.6.1 |
airspan | c5c_firmware | 𝑥 < 2.8.6.1 |
airspan | a5x_firmware | 𝑥 < 2.5.4.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-327 - Use of a Broken or Risky Cryptographic AlgorithmThe use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
- CWE-326 - Inadequate Encryption StrengthThe software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.