{"uuid": "6469524e-5084-43e9-b5b5-906dec48f397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42012", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2555", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42012\n\ud83d\udd39 Description: GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user.\n\ud83d\udccf Published: 2025-01-22T00:00:00\n\ud83d\udccf Modified: 2025-01-22T15:49:07.655274\n\ud83d\udd17 References:\n1. https://www.graudata.com/en/products/protection-against-ransomware/blocky-for-veeam/\n2. https://www.blockyforveeam.com/en/security-bulletin-2024-06-25/", "creation_timestamp": "2025-01-22T16:01:40.000000Z"}