Aptos Wisal payroll accounting before 7.1.6 uses hardcoded credentials in the Windows client to fetch the complete list of usernames and passwords from the database server, using an unencrypted connection. This allows attackers in a machine-in-the-middle position read and write access to personally identifiable information (PII) and especially payroll data and the ability to impersonate legitimate users with respect to the audit log.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Aptos
Aptos wisal |
|
CPEs | cpe:2.3:a:aptos:wisal:*:*:*:*:*:*:*:* | |
Vendors & Products |
Aptos
Aptos wisal |
|
Metrics |
ssvc
|
Mon, 26 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-798 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:59:11.240Z
Reserved: 2024-05-18T00:00:00.000Z
Link: CVE-2024-36049

Updated: 2024-08-02T03:30:12.923Z

Status : Awaiting Analysis
Published: 2024-05-24T17:15:45.450
Modified: 2024-11-21T09:21:30.857
Link: CVE-2024-36049

No data.