CVE-2021-41286

Omikron MultiCash Desktop 4.00.008.SP5 relies on a client-side authentication mechanism. When a user logs into the application, the validity of the password is checked locally. All communication to the database backend is made via the same technical account. Consequently, an attacker can attach a debugger to the process or create a patch that manipulates the behavior of the login function. When the function always returns the success value (corresponding to a correct password), an attacker can login with any desired account, such as the administrative account of the application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:omikron:multicash:4.00.008:sp5:*:*:*:*:*:*

History

09 Oct 2021, 03:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8
References (MISC) https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt - (MISC) https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-047.txt - Third Party Advisory
CPE cpe:2.3:a:omikron:multicash:4.00.008:sp5:*:*:*:*:*:*
CWE CWE-287

05 Oct 2021, 16:40

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-05 16:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-41286

Mitre link : CVE-2021-41286

CVE.ORG link : CVE-2021-41286


JSON object : View

Products Affected

omikron

  • multicash
CWE
CWE-287

Improper Authentication