CVE-2022-3780: CWE-284 Improper Access Control in Devolutions Remote Desktop Manager
Database connections on deleted users could stay active on MySQL data sources in Remote Desktop Manager 2022.3.7 and below which allow deleted users to access unauthorized data. This issue affects : Remote Desktop Manager 2022.3.7 and prior versions.
AI Analysis
Technical Summary
CVE-2022-3780 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) affecting Devolutions Remote Desktop Manager versions 2022.3.7 and earlier. The vulnerability arises because database connections associated with deleted users remain active on MySQL data sources. This flaw allows unauthorized access whereby deleted users can continue to access sensitive data despite their accounts being removed. The vulnerability does not require any privileges or user interaction to exploit, and it can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N). The impact is primarily on confidentiality, as unauthorized users can read sensitive data from the database, but it does not affect integrity or availability. The scope is unchanged, meaning the vulnerability affects only the vulnerable component without extending to other components. The vulnerability was published on November 1, 2022, with a CVSS v3.1 score of 7.5, indicating a high severity level. No known exploits are currently reported in the wild. The root cause is improper session or connection termination logic that fails to close active database connections when user accounts are deleted, leading to persistent unauthorized access. This issue is critical in environments where Remote Desktop Manager is used to manage database connections and credentials, as it undermines access control mechanisms and could lead to data leakage or unauthorized data exposure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data managed through Remote Desktop Manager, especially in sectors such as finance, healthcare, government, and critical infrastructure where database access control is paramount. Unauthorized access by deleted users could lead to exposure of confidential customer information, intellectual property, or internal operational data. This could result in regulatory non-compliance, particularly with GDPR requirements on data protection and access control, potentially leading to fines and reputational damage. Additionally, the persistence of active connections despite user deletion complicates incident response and user access audits, increasing the risk of insider threats or misuse of credentials. Organizations relying heavily on Remote Desktop Manager for centralized credential management and database access are particularly vulnerable, as this flaw undermines the trustworthiness of their access control policies.
Mitigation Recommendations
1. Immediate upgrade to the latest version of Devolutions Remote Desktop Manager where this vulnerability is patched is the most effective mitigation. 2. Until patching is possible, implement manual monitoring and termination of database connections associated with deleted users on MySQL data sources to ensure no orphaned sessions remain active. 3. Enforce strict database-level access controls and auditing to detect and prevent unauthorized access from stale connections. 4. Regularly review and audit user accounts and active sessions in both Remote Desktop Manager and underlying databases to identify anomalies. 5. Consider implementing network segmentation and firewall rules to restrict database access only to authorized and authenticated users and systems. 6. Employ multi-factor authentication and robust credential management policies to reduce the risk of unauthorized access. 7. Enhance logging and alerting mechanisms to detect unusual database connection patterns that may indicate exploitation attempts. 8. Conduct security awareness training for administrators managing Remote Desktop Manager to ensure prompt revocation of access and session termination upon user deletion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Switzerland, Italy, Spain
CVE-2022-3780: CWE-284 Improper Access Control in Devolutions Remote Desktop Manager
Description
Database connections on deleted users could stay active on MySQL data sources in Remote Desktop Manager 2022.3.7 and below which allow deleted users to access unauthorized data. This issue affects : Remote Desktop Manager 2022.3.7 and prior versions.
AI-Powered Analysis
Technical Analysis
CVE-2022-3780 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) affecting Devolutions Remote Desktop Manager versions 2022.3.7 and earlier. The vulnerability arises because database connections associated with deleted users remain active on MySQL data sources. This flaw allows unauthorized access whereby deleted users can continue to access sensitive data despite their accounts being removed. The vulnerability does not require any privileges or user interaction to exploit, and it can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N). The impact is primarily on confidentiality, as unauthorized users can read sensitive data from the database, but it does not affect integrity or availability. The scope is unchanged, meaning the vulnerability affects only the vulnerable component without extending to other components. The vulnerability was published on November 1, 2022, with a CVSS v3.1 score of 7.5, indicating a high severity level. No known exploits are currently reported in the wild. The root cause is improper session or connection termination logic that fails to close active database connections when user accounts are deleted, leading to persistent unauthorized access. This issue is critical in environments where Remote Desktop Manager is used to manage database connections and credentials, as it undermines access control mechanisms and could lead to data leakage or unauthorized data exposure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data managed through Remote Desktop Manager, especially in sectors such as finance, healthcare, government, and critical infrastructure where database access control is paramount. Unauthorized access by deleted users could lead to exposure of confidential customer information, intellectual property, or internal operational data. This could result in regulatory non-compliance, particularly with GDPR requirements on data protection and access control, potentially leading to fines and reputational damage. Additionally, the persistence of active connections despite user deletion complicates incident response and user access audits, increasing the risk of insider threats or misuse of credentials. Organizations relying heavily on Remote Desktop Manager for centralized credential management and database access are particularly vulnerable, as this flaw undermines the trustworthiness of their access control policies.
Mitigation Recommendations
1. Immediate upgrade to the latest version of Devolutions Remote Desktop Manager where this vulnerability is patched is the most effective mitigation. 2. Until patching is possible, implement manual monitoring and termination of database connections associated with deleted users on MySQL data sources to ensure no orphaned sessions remain active. 3. Enforce strict database-level access controls and auditing to detect and prevent unauthorized access from stale connections. 4. Regularly review and audit user accounts and active sessions in both Remote Desktop Manager and underlying databases to identify anomalies. 5. Consider implementing network segmentation and firewall rules to restrict database access only to authorized and authenticated users and systems. 6. Employ multi-factor authentication and robust credential management policies to reduce the risk of unauthorized access. 7. Enhance logging and alerting mechanisms to detect unusual database connection patterns that may indicate exploitation attempts. 8. Conduct security awareness training for administrators managing Remote Desktop Manager to ensure prompt revocation of access and session termination upon user deletion.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- DEVOLUTIONS
- Date Reserved
- 2022-10-31T18:47:33.041Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcaa3
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 1:55:28 PM
Last updated: 8/18/2025, 11:33:02 PM
Views: 13
Related Threats
CVE-2025-9174: OS Command Injection in neurobin shc
MediumCVE-2025-9171: Cross Site Scripting in SolidInvoice
MediumCVE-2025-9170: Cross Site Scripting in SolidInvoice
MediumCVE-2025-9169: Cross Site Scripting in SolidInvoice
MediumCVE-2025-9168: Cross Site Scripting in SolidInvoice
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.