CVE-2024-42012

medium

Description

GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user.

References

https://www.graudata.com/en/products/protection-against-ransomware/blocky-for-veeam/

https://www.blockyforveeam.com/en/security-bulletin-2024-06-25/

Details

Source: Mitre, NVD

Published: 2025-01-22

Updated: 2025-02-04

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Severity: Low

CVSS v3

Base Score: 5.7

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

Severity: Medium

EPSS

EPSS: 0.00016