Vulnerability Description
Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ontrack Project | Ontrack | 3.4 |
Related Weaknesses (CWE)
References
- https://cwe.mitre.org/data/definitions/521.htmlThird Party Advisory
- https://cwe.mitre.org/data/definitions/916.htmlThird Party Advisory
- https://gainsec.com/2022/08/07/cve-2022-hardcoded-creds-weak-password-hauk-androThird Party Advisory
- https://github.com/inoda/ontrack/issues/78Issue TrackingThird Party Advisory
- https://cwe.mitre.org/data/definitions/521.htmlThird Party Advisory
- https://cwe.mitre.org/data/definitions/916.htmlThird Party Advisory
- https://gainsec.com/2022/08/07/cve-2022-hardcoded-creds-weak-password-hauk-androThird Party Advisory
- https://github.com/inoda/ontrack/issues/78Issue TrackingThird Party Advisory
FAQ
What is CVE-2022-37164?
CVE-2022-37164 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed wit...
How severe is CVE-2022-37164?
CVE-2022-37164 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-37164?
Check the references section above for vendor advisories and patch information. Affected products include: Ontrack Project Ontrack.