PT-2025-31225 · Tsplus · Tsplus
Michał Walkowski
·
Published
2025-07-29
·
Updated
2025-07-29
·
CVE-2025-5922
CVSS v4.0
4.8
Medium
| AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
TSplus versions prior to 18.40.6.17
TSplus versions prior to 17.2025.6.27
TSplus versions prior to 16.2025.6.27
Description
Access to the TSplus Remote Access Admin Tool is restricted to administrators (unless the "Disable UAC" option is enabled) and requires a PIN code. In affected versions, the PIN’s hash is stored in a system registry accessible to regular users, potentially allowing a brute-force attack using rainbow tables due to the lack of salting.
Recommendations
Update TSplus to version 18.40.6.17 or later.
Update TSplus to version 17.2025.6.27 or later.
Update TSplus to version 16.2025.6.27 or later.
Fix
Insufficiently Protected Credentials
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Tsplus