CVE-2014-4623
Summary
| CVE | CVE-2014-4623 |
|---|---|
| State | PUBLISHED |
| Assigner | dell |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-10-25 10:55:06 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:M/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Emc | Avamar | 6.0.1 | All | All | All |
| Application | Emc | Avamar | 6.0.2 | All | All | All |
| Application | Emc | Avamar | 6.0.3 | All | All | All |
| Application | Emc | Avamar | 6.1 | All | All | All |
| Application | Emc | Avamar | 6.1.101-87 | All | All | All |
| Application | Emc | Avamar | 7.0 | All | All | All |
| Application | Emc | Avamar | 7.0 | sp1 | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| EMC Avamar CVE-2014-4623 Password Encryption Weakness | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| EMC Avamar Password Hardening Package Weak Encryption Algorithm Lets Local Users Decrypt Passwords - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| EMC Avamar Weak Password Storage ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | |
| archives.neohapsis.com/archives/bugtraq/2014-10/0146.html | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.