Skip to main content

CVE-2022-42956: n/a in n/a

High
VulnerabilityCVE-2022-42956cvecve-2022-42956
Published: Mon Nov 07 2022 (11/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The PassWork extension 5.0.9 for Chrome and other browsers allows an attacker to obtain the cleartext master password.

AI-Powered Analysis

AILast updated: 07/03/2025, 09:42:58 UTC

Technical Analysis

CVE-2022-42956 is a high-severity vulnerability affecting the PassWork browser extension version 5.0.9, which is used on Chrome and other browsers. The vulnerability allows an attacker to obtain the cleartext master password stored or managed by the extension. This is classified under CWE-312, which involves the cleartext storage or transmission of sensitive information. The CVSS 3.1 base score is 7.5, indicating a high impact with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). Essentially, an attacker can remotely exploit this vulnerability without authentication or user interaction to extract the master password in plaintext, which compromises the confidentiality of all passwords managed by the extension. Since the master password is the key to accessing all stored credentials, this vulnerability can lead to widespread credential theft and subsequent account compromises. No patches or fixes are currently linked, and no known exploits are reported in the wild as of the publication date (November 7, 2022).

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those relying on PassWork extension for password management. The exposure of the master password compromises the confidentiality of all stored credentials, potentially leading to unauthorized access to corporate accounts, internal systems, and sensitive data. This can result in data breaches, intellectual property theft, and financial losses. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, face increased compliance risks and potential penalties under GDPR if credential compromise leads to personal data breaches. Additionally, the ease of exploitation without user interaction or privileges increases the risk of automated or large-scale attacks targeting employees using this extension. The lack of a patch means organizations must rely on mitigation and alternative controls until a fix is available.

Mitigation Recommendations

Given the absence of an official patch, European organizations should take immediate practical steps: 1) Identify and inventory all users and systems with the PassWork extension installed, particularly version 5.0.9. 2) Temporarily disable or uninstall the PassWork extension until a secure version is released. 3) Educate users on the risks and encourage the use of alternative, vetted password managers with strong security track records. 4) Enforce multi-factor authentication (MFA) on all critical accounts to reduce the impact of credential compromise. 5) Monitor network traffic and endpoint logs for unusual access patterns or attempts to extract browser extension data. 6) Implement endpoint protection controls that can detect or block suspicious activities related to browser extensions. 7) Prepare incident response plans to quickly address potential credential theft incidents. 8) Stay informed on vendor updates or security advisories regarding PassWork to apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-15T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb05e

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/3/2025, 9:42:58 AM

Last updated: 8/5/2025, 4:30:56 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats