Improper Password Policy in HCL MyXalytics Allows Brute-Force Attacks
CVE-2024-42173
4.8MEDIUM
Key Information:
- Vendor
- HCL Software Software
- Status
- Dryice Myxalytics
- Vendor
- CVE Published:
- 11 January 2025
Summary
HCL MyXalytics has a vulnerability related to improper implementation of its password policy. This flaw enables attackers to exploit weak password choices and the absence of account lockout mechanisms, making it feasible to guess or conduct brute-force attacks on user accounts when the corresponding username is known. Organizations using HCL MyXalytics should review their password policies and consider implementing stronger password requirements and lockout protocols to mitigate this risk.
Affected Version(s)
DRYiCE MyXalytics 6.3
References
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved