cve/2022/CVE-2022-34906.md

20 lines
854 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-34906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34906)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A hard-coded cryptographic key is used in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to decrypt sensitive information saved in FileWave, and even send crafted requests.
### POC
#### Reference
- https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/
- https://kb.filewave.com/pages/viewpage.action?pageId=55544244
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/tr3ss/gofetch