Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-15552

Summary
Assigner-NCSC-FI
Assigner Org ID-db4dfee8-a97e-4877-bfae-eba6d14a2166
Published At-16 Mar, 2026 | 10:44
Updated At-16 Mar, 2026 | 18:14
Rejected At-
Credits

Long Session Lifetime in Truesec LAPSWebUI

Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:NCSC-FI
Assigner Org ID:db4dfee8-a97e-4877-bfae-eba6d14a2166
Published At:16 Mar, 2026 | 10:44
Updated At:16 Mar, 2026 | 18:14
Rejected At:
▼CVE Numbering Authority (CNA)
Long Session Lifetime in Truesec LAPSWebUI

Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Affected Products
Vendor
Truesec
Product
LAPSWebUI
Default Status
unaffected
Versions
Affected
  • From 0 before 2.4 (maven)
Unaffected
  • 2.4 (maven)
Problem Types
TypeCWE IDDescription
CWECWE-613CWE-613 Insufficient session expiration
Type: CWE
CWE ID: CWE-613
Description: CWE-613 Insufficient session expiration
Metrics
VersionBase scoreBase severityVector
4.06.0MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
N/AEscalation of Privileges
N/AInformation Disclosure
CAPEC ID: N/A
Description: Escalation of Privileges
CAPEC ID: N/A
Description: Information Disclosure
Solutions

Configurations

Workarounds

Configure LAPSWebUI to require Entra ID sign-in every time a user wants to display a password, by enabling the setting Force Reauth on Password request.

Exploits

Credits

finder
Laban Sköllermark at Reversec Sweden AB
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://labs.reversec.com/advisories/2026/03/long-session-lifetime-in-truesec-lapswebui
N/A
Hyperlink: https://labs.reversec.com/advisories/2026/03/long-session-lifetime-in-truesec-lapswebui
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:db4dfee8-a97e-4877-bfae-eba6d14a2166
Published At:16 Mar, 2026 | 14:17
Updated At:20 Apr, 2026 | 13:29

Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.0MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

truesec
truesec
>>lapswebui>>Versions before 2.4(exclusive)
cpe:2.3:a:truesec:lapswebui:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-613Secondarydb4dfee8-a97e-4877-bfae-eba6d14a2166
CWE ID: CWE-613
Type: Secondary
Source: db4dfee8-a97e-4877-bfae-eba6d14a2166
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://labs.reversec.com/advisories/2026/03/long-session-lifetime-in-truesec-lapswebuidb4dfee8-a97e-4877-bfae-eba6d14a2166
Third Party Advisory
Hyperlink: https://labs.reversec.com/advisories/2026/03/long-session-lifetime-in-truesec-lapswebui
Source: db4dfee8-a97e-4877-bfae-eba6d14a2166
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2025-15553
Matching Score-10
Assigner-National Cyber Security Centre Finland (NCSC-FI)
ShareView Details
Matching Score-10
Assigner-National Cyber Security Centre Finland (NCSC-FI)
CVSS Score-6||MEDIUM
EPSS-0.01% / 2.98%
||
7 Day CHG~0.00%
Published-16 Mar, 2026 | 10:45
Updated-20 Apr, 2026 | 13:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Logout Functionality in Truesec LAPSWebUI

Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Action-Not Available
Vendor-truesecTruesec
Product-lapswebuiLAPSWebUI
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-15554
Matching Score-8
Assigner-National Cyber Security Centre Finland (NCSC-FI)
ShareView Details
Matching Score-8
Assigner-National Cyber Security Centre Finland (NCSC-FI)
CVSS Score-6||MEDIUM
EPSS-0.02% / 4.04%
||
7 Day CHG~0.00%
Published-16 Mar, 2026 | 10:46
Updated-07 Apr, 2026 | 00:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Admin Passwords Cached by Browsers in Truesec LAPSWebUI

Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin passwords.

Action-Not Available
Vendor-truesecTruesec
Product-lapswebuiLAPSWebUI
CWE ID-CWE-525
Use of Web Browser Cache Containing Sensitive Information
CVE-2024-36041
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.10% / 26.30%
||
7 Day CHG~0.00%
Published-05 Jul, 2024 | 00:00
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KSmserver in KDE Plasma Workspace (aka plasma-workspace) before 5.27.11.1 and 6.x before 6.0.5.1 allows connections via ICE based purely on the host, i.e., all local connections are accepted. This allows another user on the same machine to gain access to the session manager, e.g., use the session-restore feature to execute arbitrary code as the victim (on the next boot) via earlier use of the /tmp directory.

Action-Not Available
Vendor-n/aKDE
Product-plasma-workspacen/aplasma-workspace
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2024-1623
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.7||HIGH
EPSS-0.03% / 8.72%
||
7 Day CHG~0.00%
Published-14 Mar, 2024 | 12:47
Updated-23 Jan, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient session timeout vulnerability in Sagemcom router

Insufficient session timeout vulnerability in the FAST3686 V2 Vodafone router from Sagemcom. This vulnerability could allow a local attacker to access the administration panel without requiring login credentials. This vulnerability is possible because the 'Login.asp and logout.asp' files do not handle session details correctly.

Action-Not Available
Vendor-sagemcomSagemcomsagemcom
Product-f\@st_3686f\@st_3686_firmwareFAST3686 V2 Vodafonefast3686_v2_vodafone
CWE ID-CWE-613
Insufficient Session Expiration
Details not found