Verax NMS Hardcoded Private Key (CVE-2013-1352)
Verax NMS provides a service-oriented, unified management & monitoring of networks, applications and infrastructure enabling quick problem detection, root-cause analysis, reporting and automating recovery, reducing costs and shortening downtimes of IT service delivery.
In versions prior to 2.1.0 of VeraxNMS, the server-side component eadministratorconsole-core-1.5.2.jar, contains a method named decryptPassword(). This method provides the functionality to decrypt a user's password using an implementation of RSA. Within com.veraxsystems.eadministratorconsole.remote.service.impl, it has been discovered that decryptPassword() uses a static, hardcoded private key to facilitate this process. As a result, these passwords should be considered insecure due to the fact that recovering the private key is decidedly trivial.
All versions of Verax NMS prior to 2.1.0 are vulnerable.
Users should upgrade to version 2.1.0 of Verax NMS.
This vulnerability was discovered by Andrew Brooks.
CVE-2013-1352 CVE-2013-1351 (Related) http://download.veraxsystems.com/download/nms-2.1.0-release-notes.txt
1/10/2013 - Vendor notified 1/11/2013 - Vendor acknowledges bug report 2/20/2013 - Vulnerability remediated and pushed to mainline