Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-6602Use of a Broken or Risky Cryptographic Algorithm in Webnms Framework

Severity
9.8CRITICALNVD
CNA7.5
EPSS
47.8%
top 2.29%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 23
Latest updateMay 14

Description

ZOHO WebNMS Framework 5.2 and 5.2 SP1 use a weak obfuscation algorithm to store passwords, which allows context-dependent attackers to obtain cleartext passwords by leveraging access to WEB-INF/conf/securitydbData.xml. NOTE: this issue can be combined with CVE-2016-6601 for a remote exploit.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-rrpj-43vg-95p8: ZOHO WebNMS Framework 52022-05-14
CVEList
CVE-2016-6602: ZOHO WebNMS Framework 52017-01-23

💥Exploits & PoCs

1
Exploit-DB
WebNMS Framework Server 5.2/5.2 SP1 - Multiple Vulnerabilities2016-08-10
CVE-2016-6602 — Zohocorp Webnms Framework vulnerability | cvebase