{"vuid":"VU#491770","idnumber":"491770","name":"WebEOC implements weak algorithms to encrypt sensitive information","keywords":["WebEOC","Weak encryption","information disclosure"],"overview":"WebEOC uses weak cryptographic algorithms to encrypt sensitive information.","clean_desc":"WebEOC is a web-based crisis information management application that provides functions to gather, coordinate, and disseminate information between emergency personnel and Emergency Operations Centers (EOC). WebEOC uses weak algorithms to encrypt sensitive information. The prerequisite information and effort needed to crack the encryption depends on the algorithm being attacked. However, for a skilled attacker, compromising  the crypto-system may still a trivial task.","impact":"A remote attacker could recover or derive a private encryption keys, or apply simple cryptanalytic techniques to decipher an encrypted message.","resolution":"Upgrade\nVersion 6.0.2 corrects this vulnerability. According to ESi: This vulnerability is addressed in 6.0.2 by hashing passwords (using SHA-512) rather than encrypting them. To obtain WebEOC upgrades, contact ESi Technical Support.","workarounds":"Restrict Access Restrict access to the WebEOC login pages to only known and trusted users.","sysaffected":"","thanks":"This document is based on technical analysis by IOActive and additional information from ESi. Thanks also to the City of Seattle for bringing this to our attention.","author":"This document was written by Jeff Gennari.","public":["http://www.esi911.com/esi/products/webeoc.shtml","http://www.esi911.com/esi/support/support.htm"],"cveids":["CVE-2005-2281"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-04-20T15:52:46Z","publicdate":"2005-07-13T00:00:00Z","datefirstpublished":"2005-07-13T15:00:20Z","dateupdated":"2005-07-14T16:35:44Z","revision":44,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"5","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"7","cam_scorecurrent":"2.12625","cam_scorecurrentwidelyknown":"5.67","cam_scorecurrentwidelyknownexploited":"10.395","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":2.12625,"vulnote":null}