Updates released by Retrospect, Inc. for its cross-platform backup and recovery software address numerous bugs, including a password hashing weakness that puts users’ files at risk.
Retrospect backup clients are designed to store hashed versions of user passwords. However, researchers discovered a bug in the hash generating algorithm that makes it easy for an attacker to brute-force the password and gain access to the victim’s backup files.
“The password is not fully utilized when generating a hash, allowing the possibility of a weak hash with a higher probability of collision with other passwords,” the CERT Coordination Center at Carnegie Mellon University wrote in an advisory. “Attackers with network access to a machine running the Retrospect client may be able to generate brute-force passwords that are guaranteed to collide with the hashed password with a maximum of 128 tries.”
Retrospect has pointed out that the security hole can be exploited by “a sophisticated individual with a significant amount of technical expertise and network access.”
The vulnerability (CVE-2015-2864) only affects customers who use clients with password protection. Customers using clients with public/private key authentication are not impacted. All versions of the product are affected, including Retrospect 8 for Mac and Retrospect 7 for Windows.
The flaw was publicly disclosed by Josep Pi Rodriguez and Pedro Guillen Nunez at the Hack in Paris conference in June 2014. Retrospect was notified of the existence of the bug in late April 2015.
The vulnerability was addressed by Retrospect on June 9 with the release of version 10.0.2.119 for Windows, version 10.0.2.104 for Linux, and version 12.0.2.116 for Mac. Users can resolve the issue either by updating the Retrospect engine and clients, or by switching to public key authentication.
Retrospect has published an advisory containing instructions on how to update the backup software and how to switch to keypairs.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
