Ipswitch IMail Weak Password Encryption Weakness

medium Nessus Network Monitor Plugin ID 2049

Synopsis

The remote host stores local confidential data in an insecure manner.

Description

The remote host is running Ipswitch IMail, an e-mail server that serves email via a web interface. IMail runs on Microsoft Windows operating systems. Ipswitch IMail is reported to use a weak encryption algorithm when obfuscating saved passwords. A local attacker who has the ability to read the encrypted passwords from the system registry may easily derive the plaintext password if the username that is associated with the password is known.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Medium

ID: 2049

Family: SMTP Servers

Published: 8/18/2004

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4

Temporal Score: 4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Reference Information

BID: 10956