First published: Mon Feb 21 2022(Updated: )
A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured.
Credit: csirt@divd.nl csirt@divd.nl
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
>=14.0<14.44.0 | ||
Qlik Qlik Sense | >=14.0<14.44.0 | |
Microsoft Windows |
Update Qlik Sense Enterprise on Windows to version 14.44.0 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0564 is classified as a medium severity vulnerability.
To mitigate CVE-2022-0564, update Qlik Sense Enterprise to version 14.45 or later.
CVE-2022-0564 affects Qlik Sense Enterprise versions from 14.0 to 14.44.0 running on Windows.
Exploiting CVE-2022-0564 allows an attacker to enumerate domain user accounts through authentication requests.
CVE-2022-0564 can be exploited by sending authentication requests, making it relatively straightforward for attackers with necessary access.