Tools

News

Notícias

Classificados

Cursos

Broker

 

IPv4:

IPv6:

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extract

Patch High-Severity Passwordstate Flaw

Image © Arstechnica
A high-severity vulnerability in Passwordstate could grant attackers admin access; a patch is now available.

Passwordstate, the enterprise password manager from Click Studios, has a high-severity vulnerability patch. The issue could be exploited by an attacker who crafts a URL to reach Passwordstate’s Emergency Access page and move later into the admin console.

Click Studios describes the flaw as an authentication bypass affecting the core Passwordstate product, and said a CVE identifier has not yet been issued.

Passwordstate is used by about 29,000 customers and 370,000 security professionals. The product is designed to safeguard a company’s most privileged credentials and integrates with Active Directory for tasks such as user provisioning, password resets, event auditing, and remote session logins.

The vendor noted that the fix also patches a second vulnerability and urged customers to apply the update promptly to close the exposure. The bypass vulnerability was described as enabling access to the Passwordstate Administration section via a crafted link.

This advisory arrives after Passwordstate’s update mechanism previously suffered a breach in 2021, which led to compromised passwords and phishing incidents. Click Studios later urged affected customers to reset stored passwords and apply the security update.

Users are advised to upgrade to the latest Passwordstate release as soon as possible and monitor for further advisories as no CVE has yet been published.

 

Arstechnica

Related News

Sandworm Wipers Hit Ukraine, Grain Targeted
STL CEO: UK Connectivity Outlook Bright
Google Plans Secret AI Outpost on Christmas Island
Boingo, AT&T Execs Lead WBA Board
DojoNetworks Names Proptech Veteran as COO
AI Malware Hype Falls Short

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more