| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| meshcentral | npm | <= 1.1.16 |
The vulnerability documentation explicitly identifies HMAC-MD5 usage in RDP protocol implementation as the root cause. The specified files (sec.js and nla.js) at the referenced line numbers (461, 304, 284) handle cryptographic operations for RDP security and authentication. MD5-based HMAC is widely recognized as cryptographically weak (NIST SP 800-107), making these functions clear examples of CWE-327. The direct correlation between the advisory's technical details and known cryptographic weaknesses provides high confidence in this assessment.
KEV Misses 88% of Exploited CVEs- Get the report