Ipswitch IMail Weak Password Encryption Weakness

Low Nessus Network Monitor Plugin ID 2049

Synopsis

The remote host stores local confidential data in an insecure manner.

Description

The remote host is running Ipswitch IMail, an e-mail server that serves email via a web interface. IMail runs on Microsoft Windows operating systems. Ipswitch IMail is reported to use a weak encryption algorithm when obfuscating saved passwords. A local attacker who has the ability to read the encrypted passwords from the system registry may easily derive the plaintext password if the username that is associated with the password is known.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Low

ID: 2049

Family: SMTP Servers

Published: 2004/08/18

Modified: 2016/02/05

Dependencies: 2004, 2005

Risk Information

Risk Factor: Low

CVSSv2

Base Score: 2.1

Temporal Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:U/RC:ND

CVSSv3

Base Score: 3.9

Temporal Score: 3.9

Vector: CVSS3#AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS3#E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Reference Information

BID: 10956