Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted.
LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2025/07/CVE-2025-5922 |
Configurations
No configuration.
History
31 Jul 2025, 18:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Jul 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-29 17:15
Updated : 2025-07-31 18:42
NVD link : CVE-2025-5922
Mitre link : CVE-2025-5922
CVE.ORG link : CVE-2025-5922
JSON object : View
Products Affected
No product.