Vulnerabilities > CVE-2013-6181 - Cryptographic Issues vulnerability in EMC Watch4Net 6.0/6.1/6.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
EMC Watch4Net before 6.3 stores cleartext polled-device passwords in the installation repository, which allows local users to obtain sensitive information by leveraging repository privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
References
- http://archives.neohapsis.com/archives/bugtraq/2013-12/0140.html
- http://archives.neohapsis.com/archives/bugtraq/2013-12/0140.html
- http://packetstormsecurity.com/files/124585/EMC-Watch4net-Information-Disclosure.html
- http://packetstormsecurity.com/files/124585/EMC-Watch4net-Information-Disclosure.html
- http://www.securityfocus.com/bid/64517
- http://www.securityfocus.com/bid/64517
- http://www.securitytracker.com/id/1029535
- http://www.securitytracker.com/id/1029535