Ipswitch IMail Weak Password Encryption Weakness

Low Nessus Network Monitor Plugin ID 2049


The remote host stores local confidential data in an insecure manner.


The remote host is running Ipswitch IMail, an e-mail server that serves email via a web interface. IMail runs on Microsoft Windows operating systems. Ipswitch IMail is reported to use a weak encryption algorithm when obfuscating saved passwords. A local attacker who has the ability to read the encrypted passwords from the system registry may easily derive the plaintext password if the username that is associated with the password is known.


Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Low

ID: 2049

Family: SMTP Servers

Published: 2004/08/18

Modified: 2016/02/05

Dependencies: 2004, 2005

Risk Information

Risk Factor: Low


Base Score: 2.1

Temporal Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:U/RC:ND


Base Score: 3.9

Temporal Score: 3.9


Temporal Vector: CVSS3#E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Reference Information

BID: 10956