CVE ID | CVE-2025-5922 |
Publication date | 29 July 2025 |
Vendor | TSplus |
Product | TSplus Remote Access |
Vulnerable versions | All before v18.40.6.17 / v17.2025.6.27 / v16.2025.6.27 |
Vulnerability type (CWE) | Insufficiently Protected Credentials (CWE-522) |
Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerability in TSplus Remote Access software and participated in coordination of its disclosure.
The vulnerability CVE-2025-5922: Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted. LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.
Credits
We thank Michał Walkowski, PhD, for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.