Use of Password Hash With Insufficient Computational Effort vulnerability in percona percona-toolkit allows Encryption Brute Forcing.This issue affects percona-toolkit: 3.6.0.
History

Mon, 16 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 15 Dec 2024 11:00:00 +0000

Type Values Removed Values Added
Description Use of Password Hash With Insufficient Computational Effort vulnerability in percona percona-toolkit allows Encryption Brute Forcing.This issue affects percona-toolkit: 3.6.0.
Title Misuse of SHA256 to create an encryption key
Weaknesses CWE-916
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CyberArk

Published: 2024-12-15T10:56:26.124Z

Updated: 2024-12-16T16:41:35.354Z

Reserved: 2024-08-12T12:50:54.839Z

Link: CVE-2024-7701

cve-icon Vulnrichment

Updated: 2024-12-16T16:41:28.117Z

cve-icon NVD

Status : Received

Published: 2024-12-15T11:15:05.387

Modified: 2024-12-15T11:15:05.387

Link: CVE-2024-7701

cve-icon Redhat

No data.