cvelist/2024/42xxx/CVE-2024-42012.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2024-07-28 14:00:32 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2025-01-22 16:01:00 +00:00
"ID": "CVE-2024-42012",
"STATE": "PUBLIC"
2024-07-28 14:00:32 +00:00
},
2025-01-22 16:01:00 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2024-07-28 14:00:32 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2025-01-22 16:01:00 +00:00
"value": "GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.graudata.com/en/products/protection-against-ransomware/blocky-for-veeam/",
"refsource": "MISC",
"name": "https://www.graudata.com/en/products/protection-against-ransomware/blocky-for-veeam/"
},
{
"refsource": "CONFIRM",
"name": "https://www.blockyforveeam.com/en/security-bulletin-2024-06-25/",
"url": "https://www.blockyforveeam.com/en/security-bulletin-2024-06-25/"
2024-07-28 14:00:32 +00:00
}
]
}
}