An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.
The product accepts input that identifies a Windows UNC share ('\\UNC\share\name') that potentially redirects access to an unintended location or arbitrary file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03 | government resource third party advisory us government resource |
https://www.ptc.com/en/support/article/cs399528 | vendor advisory |
https://www.dragos.com/advisory/ptcs-kepserverex-vulnerabilities/ | third party advisory |