Password Reset Poisoning Vulnerability Affects HaloITSM Versions Up to 2.146.1
CVE-2024-6203
8.1HIGH
What is CVE-2024-6203?
A vulnerability in HaloITSM versions up to 2.146.1 allows malicious actors to exploit password reset processes by sending poisoned links to users. If an affected user clicks on the link—whether manually or through an automated email client—the reset token becomes accessible to the attacker. This exploit facilitates unauthorized password changes, potentially leading to full account takeover. Versions following 2.146.1, including patches from 2.143.61, remediate this critical issue, underscoring the importance of timely updates and vigilance against such targeted attacks.
Affected Version(s)
HaloITSM < 2.146.1
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Damian Pfammatter, Cyber-Defence Campus (armasuisse)