Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor

Patch High-Severity Passwordstate Flaw

Image © Arstechnica
A high-severity vulnerability in Passwordstate could grant attackers admin access; a patch is now available.

Passwordstate, the enterprise password manager from Click Studios, has a high-severity vulnerability patch. The issue could be exploited by an attacker who crafts a URL to reach Passwordstate’s Emergency Access page and move later into the admin console.

Click Studios describes the flaw as an authentication bypass affecting the core Passwordstate product, and said a CVE identifier has not yet been issued.

Passwordstate is used by about 29,000 customers and 370,000 security professionals. The product is designed to safeguard a company’s most privileged credentials and integrates with Active Directory for tasks such as user provisioning, password resets, event auditing, and remote session logins.

The vendor noted that the fix also patches a second vulnerability and urged customers to apply the update promptly to close the exposure. The bypass vulnerability was described as enabling access to the Passwordstate Administration section via a crafted link.

This advisory arrives after Passwordstate’s update mechanism previously suffered a breach in 2021, which led to compromised passwords and phishing incidents. Click Studios later urged affected customers to reset stored passwords and apply the security update.

Users are advised to upgrade to the latest Passwordstate release as soon as possible and monitor for further advisories as no CVE has yet been published.

 

Arstechnica

Related News

Fiber to MDUs: Hurdles and Value
HP to lay off thousands for AI push
Crypto Hoarders Dump Tokens as Shares Fall
Texas Secures NTIA BEAD Final Approval
Sparklight Donation Aids Arizona Families
NTIA Approves Final BEAD Proposals Nationwide

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more