Reversible PassEnc Decryption Vulnerability in Unknown System
CVE-2024-3543 Published on May 2, 2024

LoadMaster Reversible Password Encryption Algorithm
Use of reversible password encryption algorithm allows attackers to decrypt passwords.  Sensitive information can be easily unencrypted by the attacker, stolen credentials can be used for arbitrary actions to corrupt the system.

Vendor Advisory NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
HIGH
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

Storing Passwords in a Recoverable Format

The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. In fact, it should be noted that recoverable encrypted passwords provide no significant benefit over plaintext passwords since they are subject not only to reuse by malicious attackers but also by malicious insiders. If a system administrator can recover a password directly, or use a brute force search on the available information, the administrator can use the password on other accounts.


Products Associated with CVE-2024-3543

Want to know whenever a new CVE is published for Progress Loadmaster? stack.watch will email you.

 

Affected Versions

Progress Software Corporation LoadMaster: kemptechnologies loadmaster: kemptechnologies loadmaster: kemptechnologies loadmaster:

Exploit Probability

EPSS
0.13%
Percentile
32.41%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.