Vulnerability Description
Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted. LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-5922?
CVE-2025-5922 is a documented vulnerability. Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a ...
How severe is CVE-2025-5922?
CVSS scoring is not yet available for CVE-2025-5922. Check NVD for updates.
Is there a patch for CVE-2025-5922?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.