Vulnerability Details : CVE-2022-1065
A vulnerability within the authentication process of Abacus ERP allows a remote attacker to bypass the second authentication factor. This issue affects: Abacus ERP v2022 versions prior to R1 of 2022-01-15; v2021 versions prior to R4 of 2022-01-15; v2020 versions prior to R6 of 2022-01-15; v2019 versions later than R5 (service pack); v2018 versions later than R5 (service pack). This issue does not affect: Abacus ERP v2019 versions prior to R5 of 2020-03-15; v2018 versions prior to R7 of 2020-04-15; v2017 version and prior versions and prior versions.
Published
2022-04-19 08:15:07
Updated
2022-04-27 14:56:09
Vulnerability category: BypassGain privilege
Products affected by CVE-2022-1065
- cpe:2.3:a:abacus:abacus_erp_2018:*:*:*:*:*:*:*:*
- cpe:2.3:a:abacus:abacus_erp_2019:*:*:*:*:*:*:*:*
- cpe:2.3:a:abacus:abacus_erp_2020:*:*:*:*:*:*:*:*
- cpe:2.3:a:abacus:abacus_erp_2021:*:*:*:*:*:*:*:*
- cpe:2.3:a:abacus:abacus_erp_2022:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-1065
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-1065
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
Switzerland Government Common Vulnerability Program |
CWE ids for CVE-2022-1065
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
The product implements an authentication technique, but it skips a step that weakens the technique.Assigned by: vulnerability@ncsc.ch (Secondary)
References for CVE-2022-1065
-
https://www.redguard.ch/advisories/abacus_mfa_bypass.txt
Exploit;Third Party Advisory
Jump to