CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-47276: Actualizer Uses OpenSSL's "-passwd" Function Which Uses SHA512 Under The Hood Instead of Proper Password Hasher like Yescript/Argon2i

7.5 CVSS

Description

Actualizer is a single shell script solution to allow developers and embedded engineers to create Debian operating systems (OS). Prior to version 1.2.0, Actualizer uses OpenSSL's "-passwd" function, which uses SHA512 instead of a more suitable password hasher like Yescript/Argon2i. All Actualizer users building a full Debian Operating System are affected. Users should upgrade to version 1.2.0 of Actualizer. Existing OS deployment requires manual password changes against the alpha and root accounts. The change will deploy's Debian's yescript overriding the older SHA512 hash created by OpenSSL. As a workaround, users need to reset both `root` and "Alpha" users' passwords.

Classification

CVE ID: CVE-2025-47276

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem Types

CWE-328: Use of Weak Hash

Affected Products

Vendor: ChewKeanHo

Product: Actualizer

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 3.14% (scored less or equal to compared to others)

EPSS Date: 2025-06-11 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-47276
https://github.com/ChewKeanHo/Actualizer/security/advisories/GHSA-v626-chv9-v9qr
https://github.com/ChewKeanHo/Actualizer/issues/1
https://github.com/openssl/openssl/issues/19340
https://github.com/ChewKeanHo/Actualizer/commit/32c9cc232c856f078f8269fba80ce7562bbff86b
https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html
https://github.com/ChewKeanHo/Actualizer/releases/tag/v1.2.0
https://www.reddit.com/r/debian/comments/1kknzqi/actualizer_v110_upgraded

Timeline