This vulnerability occurs when a system protects passwords by hashing them, but uses a hashing algorithm that is too fast or computationally cheap. This makes it easy for attackers to crack the stored password hashes using brute-force methods.
Storing password hashes instead of plaintext passwords is a fundamental security practice, but not all hashes are created equal. Fast, efficient cryptographic hashes like MD5 or SHA-1 are designed for speed, which becomes a major weakness for password storage. If an attacker steals these hashes (e.g., via a database breach), they can use powerful, parallel computing (like GPUs or cloud clusters) to test billions of password guesses per second, rapidly recovering user credentials. To resist these attacks, a password hashing scheme must be deliberately slow, memory-intensive, and include a unique salt for each password. Effective password hashing requires a combination of computational cost (key stretching), memory-hard operations, and salting to significantly slow down an attacker's offline cracking attempts. While SAST tools can detect the use of weak hash functions, Plexicus uses AI to analyze your codebase for these patterns and provides automated, context-aware remediation guidance, helping you upgrade to robust algorithms like Argon2, bcrypt, or scrypt efficiently. This shifts the security balance, making cracking attempts prohibitively expensive and time-consuming for attackers.
Impact: Bypass Protection MechanismGain Privileges or Assume Identity
If an attacker can gain access to the hashes, then the lack of sufficient computational effort will make it easier to conduct brute force attacks using techniques such as rainbow tables, or specialized hardware such as GPUs, which can be much faster than general-purpose CPUs for computing hashes.
Effectiveness: High
python
pythonpython
python