Learn about CVE-2022-27494 impacting Aethon TUG Home Base Server versions prior to 24. Discover the impact, technical details, affected systems, and mitigation steps.
A vulnerability in Aethon TUG Home Base Server versions before version 24 could allow an unauthenticated attacker to access hashed user credentials. This CVE with ID CVE-2022-27494 was published on April 12, 2022, by the ICS-CERT.
Understanding CVE-2022-27494
This section provides a detailed insight into the CVE-2022-27494 vulnerability affecting Aethon TUG Home Base Server.
What is CVE-2022-27494?
The vulnerability in Aethon TUG Home Base Server versions prior to version 24 allows an unauthenticated attacker to access hashed user credentials.
The Impact of CVE-2022-27494
The impact of this vulnerability is rated as HIGH, with a base severity score of 8.2 according to the CVSS v3.1 metrics. It can potentially lead to unauthorized access to user credentials.
Technical Details of CVE-2022-27494
In this section, we delve into the technical aspects of the CVE-2022-27494 vulnerability.
Vulnerability Description
Aethon TUG Home Base Server is vulnerable to stored cross-site scripting attacks in the "Reports" tab of the Fleet Management Console when creating or editing new reports.
Affected Systems and Versions
Vendor: Aethon Product: TUG Home Base Server Affected Versions: All versions prior to 24
Exploitation Mechanism
The vulnerability can be exploited by an unauthenticated attacker to freely access hashed user credentials, posing a risk to the confidentiality and integrity of user data.
Mitigation and Prevention
To address CVE-2022-27494, immediate actions must be taken to secure affected systems and prevent unauthorized access through the vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Subscribe to security advisories from Aethon and relevant authorities to stay informed about security patches and updates.