VYPR
Medium severityNVD Advisory· Published May 22, 2026

CVE-2026-25607

CVE-2026-25607

Description

Use of a weak password encoding algorithm in STER software allows the value of the password to be guessed after analyzing how passwords with known values are encoded.

This issue was fixed in version 9.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Weak password encoding in STER software below version 9.5 allows an attacker to guess passwords by analyzing encoded values of known passwords.

Vulnerability

STER software, a computer system for occupational safety and health management developed by the Central Institute for Labour Protection – National Research Institute, uses a weak password encoding algorithm (CWE-261). This vulnerability affects all versions below 9.5 [1]. The encoding algorithm is such that knowing the encoded value of a known plaintext password allows an attacker to deduce the encoding method and subsequently guess unknown passwords.

Exploitation

An attacker must have access to the encoded password values, for example through a database leak or other information disclosure, and also possess or be able to create pairs of known passwords and their encoded outputs. By analyzing these pairs, the attacker can reverse or model the weak encoding algorithm to predict the encoded form of unknown passwords. No special network position or authentication beyond obtaining the encoded values is required.

Impact

Successful exploitation leads to disclosure of user passwords. Although not directly exploitable for code execution, an attacker could use recovered passwords to gain unauthorized access to the STER system, potentially compromising sensitive occupational safety and health management data and associated administrative functions.

Mitigation

The vulnerability is fixed in STER version 9.5 [1][2]. Users should upgrade to version 9.5 or later. No workarounds are described in the available references. The product is not known to be listed on CISA's Known Exploited Vulnerabilities (KEV) catalog at the time of publication.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.