{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:09:12.233","vulnerabilities":[{"cve":{"id":"CVE-2025-47276","sourceIdentifier":"security-advisories@github.com","published":"2025-05-13T16:15:32.037","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Actualizer is a single shell script solution to allow developers and embedded engineers to create Debian operating systems (OS). Prior to version 1.2.0, Actualizer uses OpenSSL's  \"-passwd\" function, which uses SHA512 instead of a more suitable password hasher like Yescript/Argon2i. All Actualizer users building a full Debian Operating System are affected. Users should upgrade to version 1.2.0 of Actualizer. Existing OS deployment requires manual password changes against the alpha and root accounts. The change will deploy's Debian's yescript overriding the older SHA512 hash created by OpenSSL. As a workaround, users need to reset both `root` and \"Alpha\" users' passwords."},{"lang":"es","value":"Actualizer es una solución de script de shell único que permite a desarrolladores e ingenieros de sistemas integrados crear sistemas operativos Debian (SO). Antes de la versión 1.2.0, Actualizer utilizaba la función \"-passwd\" de OpenSSL, que utiliza SHA512 en lugar de un hash de contraseñas más adecuado como Yescript/Argon2i. Todos los usuarios de Actualizer que creen un sistema operativo Debian completo se ven afectados. Los usuarios deben actualizar a la versión 1.2.0 de Actualizer. La implementación actual del SO requiere cambios manuales de contraseñas para las cuentas alfa y root. El cambio implementará el yescript de Debian, anulando el hash SHA512 anterior creado por OpenSSL. Como workaround, los usuarios deben restablecer las contraseñas de los usuarios `root` y `Alpha`."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-328"}]}],"references":[{"url":"https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html","source":"security-advisories@github.com"},{"url":"https://github.com/ChewKeanHo/Actualizer/commit/32c9cc232c856f078f8269fba80ce7562bbff86b","source":"security-advisories@github.com"},{"url":"https://github.com/ChewKeanHo/Actualizer/issues/1","source":"security-advisories@github.com"},{"url":"https://github.com/ChewKeanHo/Actualizer/releases/tag/v1.2.0","source":"security-advisories@github.com"},{"url":"https://github.com/ChewKeanHo/Actualizer/security/advisories/GHSA-v626-chv9-v9qr","source":"security-advisories@github.com"},{"url":"https://github.com/openssl/openssl/issues/19340","source":"security-advisories@github.com"},{"url":"https://www.reddit.com/r/debian/comments/1kknzqi/actualizer_v110_upgraded","source":"security-advisories@github.com"}]}}]}