First published: Fri Nov 25 2022(Updated: )
A specific file on the sERP server if Kyungrinara(ERP solution) has a fixed password with the SYSTEM authority. This vulnerability could allow attackers to leak or steal sensitive information or execute malicious commands.
Credit: vuln@krcert.or.kr
Affected Software | Affected Version | How to fix |
---|---|---|
Webcash Serp Server | <20.2.161 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41157 is considered a high-severity vulnerability due to its potential for information leakage and execution of malicious commands.
To fix CVE-2022-41157, update the Webcash Serp Server to a version beyond 20.2.161 to eliminate the use of the hardcoded password.
If CVE-2022-41157 is exploited, attackers could leak sensitive information or execute unauthorized commands on the server.
CVE-2022-41157 specifically affects Webcash Serp Server versions prior to 20.2.161.
Organizations using the vulnerable versions of Webcash Serp Server are at risk if they have not applied the necessary updates.