Insecure storage of sensitive information in MobaXTerm <25.0.
The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configuration, on opening MobaXTerm, the user is prompted for their password. A derivative of the password is used as the master key. As both the master key and the IV are the same for each stored password, the AES CFB ciphertext depends only on the plaintext (the password). The static IV and master key make it easier to obtain sensitive information and to decrypt data when it is stored at rest.
Problem Types
Type | CWE ID | Description |
---|
CWE | CWE-1204 | CWE-1204: Generation of Weak Initialization Vector (IV) |
Type: CWE
Description: CWE-1204: Generation of Weak Initialization Vector (IV)
Metrics
Version | Base score | Base severity | Vector |
---|
3.1 | 6.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Timeline
Event | Date |
---|
Mobatek was contacted and informed about the vulnerability via email. | 2024-12-16 09:56:00 |
Initial response from Mobatek. | 2024-12-16 12:53:00 |
Further clarification about the vulnerability. | 2024-12-16 14:55:00 |
Mobatek acknowledged the vulnerability. | 2024-12-17 11:04:00 |
A fix was published. | 2025-01-17 23:00:00 |
The fix was verified by cirosec. | 2025-01-23 23:00:00 |
Event: Mobatek was contacted and informed about the vulnerability via email.
Date: 2024-12-16 09:56:00
Event: Initial response from Mobatek.
Date: 2024-12-16 12:53:00
Event: Further clarification about the vulnerability.
Date: 2024-12-16 14:55:00
Event: Mobatek acknowledged the vulnerability.
Date: 2024-12-17 11:04:00
Event: A fix was published.
Date: 2025-01-17 23:00:00
Event: The fix was verified by cirosec.
Date: 2025-01-23 23:00:00