CVE-2022-4025831.01.2023, 01:15AMI Megarac Weak password hashes for Redfish & APIEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST5.3 MEDIUMNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NcertccCNA5.3 MEDIUMNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NCVEADP------CISA-ADPADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 27%VendorProductVersionamimegarac_spx-12𝑥< 7.00amimegarac_spx-13𝑥< 5.00𝑥= Vulnerable software versionsCommon Weakness EnumerationCWE-916 - Use of Password Hash With Insufficient Computational EffortThe software generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.Referenceshttps://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023001.pdfhttps://security.netapp.com/advisory/ntap-20230731-0008/https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023001.pdfhttps://security.netapp.com/advisory/ntap-20230731-0008/