Overview
Toshiba CHEC, versions 6.6, 6.7, and possibly earlier, contain a hard-coded cryptographic key.
Description
CWE-321: Use of Hard-coded Cryptographic Key - CVE-2014-4875 Toshiba CHEC, versions 6.6, 6.7, and possibly earlier, contain a hard-coded cryptographic key in the CreateBossCredentials.jar file. An attacker that can access the bossinfo.pro file may be able to use the hard-coded AES key to decrypt its contents, including the BOSS database credentials. |
Impact
A remote, authenticated attacker may be able to acquire privileged credentials to the BOSS database. |
Solution
Apply an update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5 | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Temporal | 4.3 | E:POC/RL:U/RC:UR |
Environmental | 4.5 | CDP:LM/TD:M/CR:M/IR:ND/AR:ND |
References
Acknowledgements
Thanks to David Odell for reporting this vulnerability.
This document was written by Todd Lewellen and Joel Land.
Other Information
CVE IDs: | CVE-2014-4875 |
Date Public: | 2015-06-08 |
Date First Published: | 2015-06-08 |
Date Last Updated: | 2015-06-08 13:54 UTC |
Document Revision: | 22 |