No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://netatalk.io/security/CVE-2026-44053 |
|
Thu, 21 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Netatalk 1.5.0 through 4.2.2, weak cryptography in dhcast128 uam. Fixed in 4.5.0. | Netatalk 1.5.0 through 4.2.2 uses a broken cryptographic algorithm in the DHCAST128 UAM, which allows a remote attacker to obtain authentication credentials or impersonate a user via cryptanalytic attack. |
Thu, 21 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netatalk
Netatalk netatalk |
|
| Vendors & Products |
Netatalk
Netatalk netatalk |
Thu, 21 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Netatalk 1.5.0 through 4.2.2, weak cryptography in dhcast128 uam. Fixed in 4.5.0. | |
| Title | Weak cryptography in DHCAST128 UAM | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: securin
Published:
Updated: 2026-05-21T12:39:12.128Z
Reserved: 2026-05-05T07:24:42.291Z
Link: CVE-2026-44053
Updated: 2026-05-21T12:39:08.914Z
Status : Received
Published: 2026-05-21T08:16:20.910
Modified: 2026-05-21T09:16:27.537
Link: CVE-2026-44053
No data.
OpenCVE Enrichment
Updated: 2026-05-21T11:30:06Z