Description
The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 allows remote attackers to execute code and escalate privileges via spoofing. When the client is configured to use HTTP, it does not authenticate the intended server before opening a browser window. An unauthenticated attacker capable of conducting a spoofing attack can redirect the browser to gain execution in the context of the WinLogon.exe process. If Network Level Authentication is not enforced, the vulnerability can be exploited via RDP.
Exploits (1)
References (2)
Core 2
Core References
Vendor Advisory x_refsource_misc
http://anixis.com
Exploit, Third Party Advisory x_refsource_misc
https://github.com/missing0x00/CVE-2018-5354
Scores
CVSS v3
8.8
EPSS
0.0392
EPSS Percentile
88.4%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-290
Status
published
Products (1)
anixis/password_reset_client
< 3.22
Published
Sep 30, 2020
Tracked Since
Feb 18, 2026