Impact
The vulnerability stems from a non‑functional logout feature in Truesec’s LAPSWebUI prior to version 2.4. Because the logout does not invalidate the session, local admin credentials remain exposed for any user who has access to a workstation running the application. An attacker can acquire the local administrator password from the session, enabling them to raise their privileges on that system. This weakness is classified as a priority three credential disclosure and aligns with CWE‑613.
Affected Systems
The affected product is Truesec LAPSWebUI, any release before v2.4. Administrators running versions earlier than 2.4 should be aware that a session can still carry valid local administrator credentials after a user logs out. The vendor recommends enabling the Force Reauth on Password request setting to enforce re‑authentication with Entra ID whenever a password is displayed, thereby limiting the window during which the credentials are available.
Risk and Exploitability
The CVSS score for this issue is 6, indicating moderate severity, and the EPSS score is below 1 %, suggesting that exploitation is unlikely but still possible if an attacker has local access. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a local workstation user who has logged into LAPSWebUI; the exploit requires no network access and would be easiest where users are permitted to remain logged in for extended periods.
OpenCVE Enrichment