{"vuid":"VU#622950","idnumber":"622950","name":"Toshiba Global Commerce Solutions' 4690 Point of Sale operating system contains a password hashing algorithm that can be reversed","keywords":["toshiba","global","commerce","4690","pos","point","sale","password","hashing","reversible"],"overview":"Toshiba Global Commerce Solutions' 4690 Point of Sale operating system contains a password hashing algorithm that can be reversed. (CWE-328)","clean_desc":"Toshiba Global Commerce Solutions' 4690 Point of Sale operating system contains a password hashing algorithm that can be reversed. (CWE-328) The ADXCRYPT algorithm that may be used for password hashing on the 4690 operating system is susceptible to known-plaintext attacks and hash collisions. Additional details about this vulnerability may be found in Security Bulletin R1005054.","impact":"An attacker may be able to reverse or find a hashing collision for passwords hashed with ADXCRYPT and stored in the ADXCSOUF.DAT file.","resolution":"Use \"Enhanced Security\"\n4690 OS version V5R1 or later has the option to enable \"Enhanced Security\" that will use the SHA1 hashing algorithm. Instructions for enabling 4690 OS Enhanced Security can be found in the V6R4 4690 OS Planning, Installation, and Configuration Guide beginning on page 140. Use a LDAP server for authentication\n4690 OS version V6R3 or later has the option to use an LDAP server for authentication. This method will use whatever hashing algorithm the LDAP server uses. Instructions for enabling LDAP, or Directory Services, can be found in the V6R4 4690 OS Planning, Installation, and Configuration Guide beginning on page 23.","workarounds":"","sysaffected":"","thanks":"Thanks to \nBrian Kamusinga and David Odell\n for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www-01.ibm.com/support/docview.wss?uid=pos1R1005054","http://cwe.mitre.org/data/definitions/328.html","http://www.toshibacommerce.com","ftp://ftp.software.ibm.com/software/retail/pubs/sw/opsys/4690/ver6r4/hah2_4690_v6r4_picg_mst.pdf"],"cveids":["CVE-2014-0361"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-11-25T13:31:43Z","publicdate":"2014-04-01T00:00:00Z","datefirstpublished":"2014-04-21T19:34:32Z","dateupdated":"2014-04-21T19:34:35Z","revision":15,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"3","cvss_basevector":"AV:L/AC:M/Au:S/C:P/I:P/A:N","cvss_temporalscore":"2.3","cvss_environmentalscore":"1.7557982482635","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}