CVE-2025-53884
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-09-17
Assigner: SUSE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| neuvector | neuvector | 5.4.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-759 | The product uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the product does not also use a salt as part of the input. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
NeuVector stores user passwords and API keys using a simple, unsalted hash. This weak hashing method makes it vulnerable to rainbow table attacks, where attackers use precomputed hashes of common passwords to reverse the stored hashes and recover the original passwords or keys.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access if an attacker obtains the hashed passwords or API keys and successfully uses rainbow table attacks to recover them. This compromises user credentials or API keys, potentially allowing attackers to access systems or data without permission.