Inadequate Encryption Strength in sysPass - CVE-2017-5999

 

Inadequate Encryption Strength in sysPass - CVE-2017-5999

Published: March 6, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU39580
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-5999
CWE-ID: CWE-326
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: sysPass
Affected software:
sysPass

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in sysPass 2.x before 2.1, in which an algorithm was never sufficiently reviewed by cryptographers. The fact that inc/SP/Core/Crypt.class is using the MCRYPT_RIJNDAEL_256() function (the 256-bit block version of Rijndael, not AES) instead of MCRYPT_RIJNDAEL_128 (real AES) could help an attacker to create unknown havoc in the remote system.


How to mitigate CVE-2017-5999

Install update from vendor's website.

Sources