Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Retrospect Patches Password Hashing Flaw to Prevent Exposure of Backup Files

Updates released by Retrospect, Inc. for its cross-platform backup and recovery software address numerous bugs, including a password hashing weakness that puts users’ files at risk.

Updates released by Retrospect, Inc. for its cross-platform backup and recovery software address numerous bugs, including a password hashing weakness that puts users’ files at risk.

Retrospect backup clients are designed to store hashed versions of user passwords. However, researchers discovered a bug in the hash generating algorithm that makes it easy for an attacker to brute-force the password and gain access to the victim’s backup files.

“The password is not fully utilized when generating a hash, allowing the possibility of a weak hash with a higher probability of collision with other passwords,” the CERT Coordination Center at Carnegie Mellon University wrote in an advisory. “Attackers with network access to a machine running the Retrospect client may be able to generate brute-force passwords that are guaranteed to collide with the hashed password with a maximum of 128 tries.”

Retrospect has pointed out that the security hole can be exploited by “a sophisticated individual with a significant amount of technical expertise and network access.”

The vulnerability (CVE-2015-2864) only affects customers who use clients with password protection. Customers using clients with public/private key authentication are not impacted. All versions of the product are affected, including Retrospect 8 for Mac and Retrospect 7 for Windows.

The flaw was publicly disclosed by Josep Pi Rodriguez and Pedro Guillen Nunez at the Hack in Paris conference in June 2014. Retrospect was notified of the existence of the bug in late April 2015.

The vulnerability was addressed by Retrospect on June 9 with the release of version 10.0.2.119 for Windows, version 10.0.2.104 for Linux, and version 12.0.2.116 for Mac. Users can resolve the issue either by updating the Retrospect engine and clients, or by switching to public key authentication.

Retrospect has published an advisory containing instructions on how to update the backup software and how to switch to keypairs.

Advertisement. Scroll to continue reading.
Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.