Ipswitch IMail Weak Password Encryption Weakness

medium Nessus Network Monitor Plugin ID 2049

Synopsis

The remote host stores local confidential data in an insecure manner.

Description

The remote host is running Ipswitch IMail, an e-mail server that serves email via a web interface. IMail runs on Microsoft Windows operating systems. Ipswitch IMail is reported to use a weak encryption algorithm when obfuscating saved passwords. A local attacker who has the ability to read the encrypted passwords from the system registry may easily derive the plaintext password if the username that is associated with the password is known.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Medium

ID: 2049

Family: SMTP Servers

Published: 8/18/2004

Updated: 3/6/2019

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Reference Information

BID: 10956