We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47276

Actualizer Uses OpenSSL's "-passwd" Function Which Uses SHA512 Under The Hood Instead of Proper Password Hasher like Yescript/Argon2i



Description

Actualizer is a single shell script solution to allow developers and embedded engineers to create Debian operating systems (OS). Prior to version 1.2.0, Actualizer uses OpenSSL's "-passwd" function, which uses SHA512 instead of a more suitable password hasher like Yescript/Argon2i. All Actualizer users building a full Debian Operating System are affected. Users should upgrade to version 1.2.0 of Actualizer. Existing OS deployment requires manual password changes against the alpha and root accounts. The change will deploy's Debian's yescript overriding the older SHA512 hash created by OpenSSL. As a workaround, users need to reset both `root` and "Alpha" users' passwords.

Reserved 2025-05-05 | Published 2025-05-13 | Updated 2025-05-13 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-328: Use of Weak Hash

Product status

< 1.2.0
affected

References

github.com/...alizer/security/advisories/GHSA-v626-chv9-v9qr

github.com/ChewKeanHo/Actualizer/issues/1

github.com/openssl/openssl/issues/19340

github.com/...ommit/32c9cc232c856f078f8269fba80ce7562bbff86b

cheatsheetseries.owasp.org/...sword_Storage_Cheat_Sheet.html

github.com/ChewKeanHo/Actualizer/releases/tag/v1.2.0

www.reddit.com/.../comments/1kknzqi/actualizer_v110_upgraded

cve.org (CVE-2025-47276)

nvd.nist.gov (CVE-2025-47276)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47276

Support options

Helpdesk Chat, Email, Knowledgebase