First published: Mon Aug 22 2022(Updated: )
An improper password check exists in the login functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. An attacker that owns a users' password hash will be able to use it to directly login into the account, leading to increased privileges.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WWBN AVideo | =11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32282 has been classified with a medium severity level due to the risk of unauthorized access to user accounts.
CVE-2022-32282 allows an attacker with a user's password hash to log in directly to their account, resulting in unauthorized access.
To mitigate CVE-2022-32282, ensure that password hashes are not directly usable for authentication by implementing proper security measures.
No, CVE-2022-32282 specifically affects WWBN AVideo version 11.6 and the development master commit 3f7c0364.
Users should update their passwords and review their account activity regularly to secure their accounts against CVE-2022-32282.