Improper Password Policy in HCL MyXalytics Allows Brute-Force Attacks
CVE-2024-42173

4.8MEDIUM

Key Information:

Vendor
HCL Software Software
Status
Dryice Myxalytics
Vendor
CVE Published:
11 January 2025

Summary

HCL MyXalytics has a vulnerability related to improper implementation of its password policy. This flaw enables attackers to exploit weak password choices and the absence of account lockout mechanisms, making it feasible to guess or conduct brute-force attacks on user accounts when the corresponding username is known. Organizations using HCL MyXalytics should review their password policies and consider implementing stronger password requirements and lockout protocols to mitigate this risk.

Affected Version(s)

DRYiCE MyXalytics 6.3

References

CVSS V3.1

Score:
4.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.