Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted.
LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.
                
            CVSS
                No CVSS.
References
                    | Link | Resource | 
|---|---|
| https://cert.pl/en/posts/2025/07/CVE-2025-5922 | 
Configurations
                    No configuration.
History
                    31 Jul 2025, 18:42
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
29 Jul 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-29 17:15
Updated : 2025-07-31 18:42
NVD link : CVE-2025-5922
Mitre link : CVE-2025-5922
CVE.ORG link : CVE-2025-5922
JSON object : View
Products Affected
                No product.
