Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/cybelesoft/virtualui/issues/1 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:25:16.743Z
Reserved: 2021-12-06T00:00:00
Link: CVE-2021-44554

No data.

Status : Modified
Published: 2021-12-20T09:15:06.727
Modified: 2024-11-21T06:31:12.863
Link: CVE-2021-44554

No data.