Skip to main content

CVE-2022-45164: n/a in n/a

Medium
VulnerabilityCVE-2022-45164cvecve-2022-45164
Published: Tue Jan 10 2023 (01/10/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in Archibus Web Central 2022.03.01.107. A service exposed by the application allows a basic user to cancel (delete) a booking, created by someone else - even if this basic user is not a member of the booking

AI-Powered Analysis

AILast updated: 07/08/2025, 15:55:58 UTC

Technical Analysis

CVE-2022-45164 is a medium-severity vulnerability identified in Archibus Web Central version 2022.03.01.107. Archibus Web Central is a widely used integrated workplace management system (IWMS) that facilitates space management, real estate, and facilities management. The vulnerability arises from improper access control in a service exposed by the application, which allows a basic user to cancel or delete a booking created by another user, even if the basic user is not a member of that booking. This indicates a failure in enforcing authorization checks, specifically a lack of proper permission validation (CWE-284: Improper Access Control). The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The attacker must have basic user privileges (PR:L), but no elevated privileges are necessary. The impact is limited to availability aspects of the booking data, as confidentiality and integrity are not affected. There is no indication of known exploits in the wild, and no patches or vendor advisories are currently linked to this CVE. The CVSS v3.1 base score is 4.3, reflecting a medium severity level primarily due to the limited scope and impact of the vulnerability.

Potential Impact

For European organizations using Archibus Web Central, this vulnerability could disrupt facility and resource management operations by allowing unauthorized users to cancel bookings made by others. This could lead to operational inefficiencies, scheduling conflicts, and potential loss of trust in the booking system. While the confidentiality and integrity of data are not compromised, the availability and reliability of booking services are affected. In critical environments such as hospitals, universities, government buildings, or large corporate campuses, such disruptions could have cascading effects on daily operations and resource allocation. Additionally, repeated exploitation could be used as a denial-of-service vector against booking functionalities, impacting user productivity and organizational workflows.

Mitigation Recommendations

Organizations should implement strict access control policies within Archibus Web Central, ensuring that booking cancellation permissions are correctly enforced based on user roles and booking ownership. Until an official patch is released, administrators should consider the following practical steps: 1) Restrict basic user permissions to prevent booking cancellations unless explicitly authorized. 2) Monitor booking cancellation logs for unusual activity or cancellations by unauthorized users. 3) Employ network segmentation and application-layer firewalls to limit access to the booking service to trusted users only. 4) Engage with the Archibus vendor or support channels to obtain updates or patches addressing this vulnerability. 5) Conduct internal audits of user roles and permissions regularly to ensure least privilege principles are applied. 6) Consider temporary manual approval workflows for booking cancellations to mitigate unauthorized deletions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839d93e182aa0cae2b73011

Added to database: 5/30/2025, 4:13:50 PM

Last enriched: 7/8/2025, 3:55:58 PM

Last updated: 7/31/2025, 7:29:06 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats