Impact
The vulnerability involves browsers caching local administrator passwords stored in Truesec’s LAPSWebUI prior to version 2.4. This results in an attacker who gains access to a workstation being able to obtain and use those credentials, effectively escalating privileges to local administrator on that machine. The weakness is classified as CWE‑525: information exposed through caching.
Affected Systems
Truesec LAPSWebUI versions earlier than 2.4 are affected. Any deployment of the default web interface that stores passwords in a browser is susceptible.
Risk and Exploitability
The CVSS score of 6.0 reflects moderate severity, while the EPSS score of less than 1% indicates a low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires only that an attacker have any level of access to a workstation running a browser that has cached LAPS passwords; no remote code execution or elevated network privileges are necessary. By setting the HTTP response header Cache‑Control: no‑store, the attack vector is mitigated, preventing browsers from storing the credentials.
OpenCVE Enrichment