CVE-2026-44053

Published: Mag 21, 2026 Last Modified: Mag 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,4
Source: 33c584b5-0579-4c06-b2a0-8d8329fcab9c
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: none

Description

AI Translation Available

Netatalk 1.5.0 through 4.2.2 uses a broken cryptographic algorithm in the DHCAST128 UAM, which allows a remote attacker to obtain authentication credentials or impersonate a user via cryptanalytic attack.

327

Use of a Broken or Risky Cryptographic Algorithm

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Accountability Non-Repudiation
Potential Impacts:
Read Application Data Modify Application Data Hide Activities
Applicable Platforms
Languages: Not Language-Specific, Verilog, VHDL
Technologies: Not Technology-Specific, ICS/OT
View CWE Details
https://netatalk.io/security/CVE-2026-44053