5 vulnerabilities classified as CWE-760 (使用可预测Salt的单向哈希算法). AI Chinese analysis included.
CWE-760 represents a cryptographic weakness where developers use a one-way hash function with a predictable or static salt for sensitive data like passwords. This flaw undermines security because attackers can easily pre-compute hash values using dictionary attacks or rainbow tables, effectively bypassing the protective barrier that an unpredictable salt is meant to provide. By knowing the salt in advance, adversaries can reverse-engineer common passwords without needing to crack individual hashes during an attack. To mitigate this risk, developers must generate a unique, cryptographically secure random salt for every user account. This salt should be stored alongside the hashed password, ensuring that even identical passwords result in distinct hash outputs, thereby neutralizing pre-computation attacks and significantly increasing the computational cost required for brute-force efforts.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-9290 | Authentication Weakness on Omada Controllers, Gateways and Access Points — Omada Software Controller | 5.9 | - | 2026-01-22 |
| CVE-2024-13951 | One way hash with predictable salt — ASPECT-Enterprise | 7.6 | High | 2025-05-22 |
| CVE-2023-22599 | InHand Networks InRouter302 安全漏洞 — InRouter 302 | 7.0 | High | 2023-01-12 |
| CVE-2020-28214 | Schneider Electric Modicon M221 安全漏洞 — Modicon M221 (all references, all versions) | 5.5 | - | 2020-12-11 |
| CVE-2018-5552 | DocuTrac DTISQLInstaller.exe Hard-Coded Salt — DTISQLInstaller.exe | 7.5 | - | 2018-03-19 |
Vulnerabilities classified as CWE-760 (使用可预测Salt的单向哈希算法) represent 5 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.