CVE-2025-51540

5.3 MEDIUM

📋 TL;DR

EzGED3 3.5.0 uses MD5 double-hashing without salting for password storage, making stored credentials vulnerable to offline brute-force attacks if password hashes are obtained. This affects all users of vulnerable versions where password databases could be accessed. Attackers can efficiently crack passwords using rainbow tables or GPU acceleration.

💻 Affected Systems

Products:
  • EzGED3
Versions: 3.5.0 through versions before 3.5.72.27183
Operating Systems: All platforms running EzGED3
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using default password hashing are vulnerable; custom configurations may vary.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full credential compromise leading to unauthorized administrative access, data theft, and potential lateral movement within affected systems.

🟠

Likely Case

Credential harvesting and reuse attacks if password databases are exposed, potentially enabling account takeover.

🟢

If Mitigated

Limited impact if proper access controls prevent hash disclosure and strong unique passwords are used.

🌐 Internet-Facing: MEDIUM - Risk depends on exposure of password storage; internet-facing systems with hash access face higher risk.
🏢 Internal Only: LOW - Internal systems with restricted access to password databases have reduced exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to password hashes; no authentication bypass is needed for hash cracking once obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.72.27183

Vendor Advisory: https://ballpoint.fr/en/blog/ezged3-preauth-file-read-admin-takeover

Restart Required: No

Instructions:

1. Backup current installation. 2. Download and install version 3.5.72.27183 from vendor. 3. Verify update completes successfully. 4. Consider forcing password resets for all users.

🔧 Temporary Workarounds

Force Password Reset

all

Require all users to change passwords to generate new hashes with updated algorithm after patching.

Admin panel: Force password reset for all users

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized access to password databases.
  • Enforce strong password policies and monitor for unusual authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check EzGED3 version in admin interface or configuration files; versions 3.5.0 to before 3.5.72.27183 are vulnerable.

Check Version:

Check admin dashboard or config files for version number.

Verify Fix Applied:

Confirm version is 3.5.72.27183 or later in admin panel; verify password hashing uses secure algorithm (not MD5).

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from single source
  • Unusual access to user database files

Network Indicators:

  • Suspicious requests to password-related endpoints
  • Unexpected database export activities

SIEM Query:

source="ezged3" AND (event="failed_login" OR event="db_access")

🔗 References

📤 Share & Export