The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Dec 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sick lms5xx
|
|
CPEs | cpe:2.3:h:sick:lms5xx:*:*:*:*:*:*:*:* | |
Vendors & Products |
Sick Ag
Sick Ag lms5xx |
Sick lms5xx
|
Thu, 03 Oct 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sick Ag
Sick Ag lms5xx |
|
CPEs | cpe:2.3:h:sick_ag:lms5xx:*:*:*:*:*:*:*:* | |
Vendors & Products |
Sick Ag
Sick Ag lms5xx |
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: SICK AG
Published: 2023-08-24T18:15:53.835Z
Updated: 2024-12-09T14:12:04.011Z
Reserved: 2023-04-27T18:35:47.418Z
Link: CVE-2023-31412
Vulnrichment
Updated: 2024-08-02T14:53:30.758Z
NVD
Status : Modified
Published: 2023-08-24T19:15:33.977
Modified: 2024-11-21T08:01:48.617
Link: CVE-2023-31412
Redhat
No data.