CVE-2018-5354

HIGH

ANIXIS Password Reset Client <3.22 - RCE

Title source: llm
STIX 2.1

Description

The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 allows remote attackers to execute code and escalate privileges via spoofing. When the client is configured to use HTTP, it does not authenticate the intended server before opening a browser window. An unauthenticated attacker capable of conducting a spoofing attack can redirect the browser to gain execution in the context of the WinLogon.exe process. If Network Level Authentication is not enforced, the vulnerability can be exploited via RDP.

Exploits (1)

nomisec WRITEUP
by missing0x00 · poc
https://github.com/missing0x00/CVE-2018-5354

References (2)

Core 2
Core References
Vendor Advisory x_refsource_misc
http://anixis.com
Exploit, Third Party Advisory x_refsource_misc
https://github.com/missing0x00/CVE-2018-5354

Scores

CVSS v3 8.8
EPSS 0.0392
EPSS Percentile 88.4%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-290
Status published
Products (1)
anixis/password_reset_client < 3.22
Published Sep 30, 2020
Tracked Since Feb 18, 2026