
Cloud Vulnerability DB
A community-led vulnerabilities database
DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm. The vulnerability (CVE-2023-51839) was discovered in the lib/util/vncauth.js file, line 35, where the software implements the DES-ECB encryption algorithm. The issue was reported on December 8, 2023, and affects the authentication mechanism of the software (GitHub Issue, Advisory).
The vulnerability stems from the use of DES-ECB (Data Encryption Standard in Electronic Code Book mode) for encryption. The implementation uses a fixed encryption key and lacks an initialization vector (IV). This cryptographic algorithm is considered broken and risky because it produces identical output for identical input blocks, making it vulnerable to pattern recognition attacks. The CVSS v3.1 base score for this vulnerability is 9.1 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) (NVD).
The vulnerability can lead to information disclosure and potential escalation of privileges. Due to the predictable nature of DES-ECB encryption, attackers can potentially compromise the confidentiality and integrity of sensitive data by exploiting patterns in the encrypted data (Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."