First published: Tue Aug 23 2022(Updated: )
The affected device stores sensitive information in cleartext, which may allow an authenticated user to access session data stored in the OAuth database belonging to legitimate users
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcInfo | <12.0.27 | |
Esri ArcInfo | >=15<=15.2.2 |
PcVue 12: The fix is available in Maintenance release 12.0.27 After installing the fix, users should update the Web Deployment Console (WDC) and re-deploy the Web Server. All users using the affected component should install a patched release of the WDC and re-deploy the Web Server. This will allow the WDC to update and protect the database connection string, including clearing any sensitive information stored in the web.config file.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2569 has been identified with a high severity rating due to the exposure of sensitive session data in cleartext.
To fix CVE-2022-2569, ensure that sensitive information is stored in a secure manner, such as encrypting session data.
CVE-2022-2569 affects devices running Esri ArcInfo versions up to 12.0.27 and between versions 15.0.0 and 15.2.2.
CVE-2022-2569 compromises sensitive session data that is stored in the OAuth database in cleartext.
Yes, an authenticated user may exploit CVE-2022-2569 to access session data belonging to legitimate users.