First published: Wed Nov 23 2022(Updated: )
Maarch RM 2.8.3 solution contains an improper restriction of excessive authentication attempts due to excessive verbose responses from the application. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to compromised accounts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Maarch Rm | >=2.8<2.8.6 | |
Maarch Rm | =2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37772 is considered a high severity vulnerability due to its potential to allow an unauthenticated remote attacker to exploit excessive authentication attempts.
To mitigate CVE-2022-37772, it is recommended to update Maarch RM to versions 2.8.6 or later, or 2.9.
CVE-2022-37772 affects Maarch RM versions from 2.8.0 to 2.8.5 and version 2.9.
CVE-2022-37772 is classified as an improper restriction on excessive authentication attempts vulnerability.
Yes, CVE-2022-37772 can potentially lead to compromised accounts due to excessive verbose responses from the application.