CVE-2025-46660

5.3 MEDIUM

📋 TL;DR

This vulnerability in 4C Strategies Exonaut 21.6 allows attackers to more easily crack user passwords if they gain access to the database, since passwords are hashed without cryptographic salt. This affects all organizations using the vulnerable version of Exonaut for training and exercise management.

💻 Affected Systems

Products:
  • 4C Strategies Exonaut
Versions: 21.6
Operating Systems: Any OS running Exonaut
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Exonaut 21.6 are affected as this is a fundamental cryptographic implementation issue.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with database access could crack all user passwords offline using rainbow tables or brute force, leading to complete account compromise and potential lateral movement.

🟠

Likely Case

If database backups or exports are exposed, attackers could crack weak passwords to gain unauthorized access to user accounts.

🟢

If Mitigated

With proper database security controls and strong password policies, the risk is reduced but still present if database access is obtained.

🌐 Internet-Facing: MEDIUM - If the application is internet-facing and database access is obtained through other vulnerabilities, password cracking becomes feasible.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts with database access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires database access first, then offline password cracking tools can be used against the unsalted hashes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 21.6 (check vendor for specific version)

Vendor Advisory: https://www.4cstrategies.com/solutions/exonaut/

Restart Required: No

Instructions:

1. Contact 4C Strategies for patched version. 2. Upgrade Exonaut to version with salted password hashing. 3. Force password resets for all users to generate new salted hashes.

🔧 Temporary Workarounds

Enforce Strong Password Policy

all

Require complex, long passwords to make brute-force attacks more difficult even without salt.

🧯 If You Can't Patch

  • Implement database encryption at rest and strict access controls to prevent unauthorized database access.
  • Enable multi-factor authentication to add an additional layer of security beyond passwords.

🔍 How to Verify

Check if Vulnerable:

Check Exonaut version in administration panel or configuration files. Version 21.6 is vulnerable.

Check Version:

Check Exonaut web interface administration panel or configuration files for version information.

Verify Fix Applied:

After upgrade, verify password hashes in database include salt values and are not identical for users with same passwords.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database access patterns
  • Multiple failed login attempts from new locations

Network Indicators:

  • Unexpected database connection attempts
  • Large data exports from database

SIEM Query:

source="database_logs" AND (event="unauthorized_access" OR event="mass_data_export")

🔗 References

📤 Share & Export