Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted. LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.
History

Wed, 30 Jul 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Tsplus
Tsplus tsplus Remote Access
Vendors & Products Tsplus
Tsplus tsplus Remote Access

Tue, 29 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Description Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted. LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.
Title Retrievable password hash protecting TSplus admin console
Weaknesses CWE-522
CWE-759
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-07-29T16:54:43.730Z

Updated: 2025-07-29T18:27:35.763Z

Reserved: 2025-06-09T14:00:25.264Z

Link: CVE-2025-5922

cve-icon Vulnrichment

Updated: 2025-07-29T18:27:29.861Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-29T17:15:33.823

Modified: 2025-07-31T18:42:56.503

Link: CVE-2025-5922

cve-icon Redhat

No data.