Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-22127


Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable.


Published

2022-05-25T14:15:08.637

Last Modified

2024-11-21T06:46:13.980

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application tableau tableau_server ≤ 2020.4.16 Yes
Application tableau tableau_server ≤ 2021.1.13 Yes
Application tableau tableau_server ≤ 2021.2.10 Yes
Application tableau tableau_server ≤ 2021.3.9 Yes
Application tableau tableau_server ≤ 2021.4.4 Yes

References