First published: Thu May 12 2022(Updated: )
Sysaid – Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication.
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
Sysaid On-Premises | <21.1.30 | |
Sysaid On-Premises | <21.4.45 |
Update to 21.1.30 cloud version, or to 21.4.45 on premise version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22796 is a vulnerability in the Sysaid System that allows an attacker to bypass authentication and gain unauthorized access to the system.
CVE-2022-22796 has a severity rating of 9.8, which is considered critical.
Sysaid versions up to 21.1.30 for the cloud deployment and up to 21.4.45 for on-premises deployment are affected by CVE-2022-22796.
CVE-2022-22796 is associated with CWE-287, which is an authentication bypass vulnerability.
More information about CVE-2022-22796 can be found at the following reference link: [Sysaid CVE Advisory](https://www.gov.il/en/departments/faq/cve_advisories)