We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5922

Retrievable password hash protecting TSplus admin console



Description

Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted. LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.

Reserved 2025-06-09 | Published 2025-07-29 | Updated 2025-07-29 | Assigner CERT-PL


MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-522 Insufficiently Protected Credentials

CWE-759 Use of a One-Way Hash without a Salt

Product status

Default status
unaffected

Any version before v18.40.6.17
affected

Any version before v17.2025.6.27
affected

Any version before v16.2025.6.27
affected

Credits

Michał Walkowski, PhD finder

References

cert.pl/en/posts/2025/07/CVE-2025-5922

cve.org (CVE-2025-5922)

nvd.nist.gov (CVE-2025-5922)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5922

Support options

Helpdesk Chat, Email, Knowledgebase