Knox Arkeia server 4.2, and possibly other versions, uses...
High severity
Unreviewed
Published
Apr 30, 2022
to the GitHub Advisory Database
•
Updated Feb 23, 2024
Description
Published by the National Vulnerability Database
Aug 31, 2001
Published to the GitHub Advisory Database
Apr 30, 2022
Last updated
Feb 23, 2024
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
References