Vulnerability identifier: #VU48568
Vulnerability risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-338
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
rclone
Other software /
Other software solutions
Vendor: rclone.org
Description
The vulnerability allows an attacker to decrypt or brute-force passwords.
The vulnerability exists due to Rclone uses a weak random number generator for generating passwords with much less entropy than advertised. An attacker, who is able to obtain the password protected file can decrypt data.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
rclone: 1.49.0 - 1.53.2
External links
http://github.com/rclone/rclone/issues/4783
http://rclone.org/downloads/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.