
Cloud Vulnerability DB
A community-led vulnerabilities database
MeshCentral version 1.1.16 was identified with a vulnerability related to the use of broken or risky cryptographic algorithms (CVE-2023-51838). The vulnerability was discovered in late 2023 and affects the cryptographic implementation in the software's RDP protocol handling components (GitHub Advisory).
The vulnerability stems from the use of HMAC-MD5, a cryptographically weak algorithm, in several components including rdp\protocol\pdu\sec.js, rdp\protocol\nla.js, and other related files. The issue has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD). The vulnerability is classified under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm).
The use of HMAC-MD5 makes the system susceptible to exhaustive searches and brute force attacks, potentially leading to information disclosure. The algorithm's weakness could allow attackers to compromise the cryptographic security of the system, particularly in scenarios where strong cryptographic protection is required (GitHub Advisory).
Security experts recommend replacing HMAC-MD5 with more secure algorithms such as HMAC-SHA1 for cryptographic operations. Users should consider upgrading to newer versions of MeshCentral where this vulnerability has been addressed (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."