CVE-2022-45166: n/a in n/a
An issue was discovered in Archibus Web Central 2022.03.01.107. A service exposed by the application accepts a set of user-controlled parameters that are used to act on the data returned to the user. It allows a basic user to access data unrelated to their role.
AI Analysis
Technical Summary
CVE-2022-45166 is a medium-severity vulnerability affecting Archibus Web Central version 2022.03.01.107. The vulnerability arises from improper access control in a service exposed by the application. Specifically, the service accepts user-controlled parameters that influence the data returned to the user. Due to insufficient authorization checks, a basic user can manipulate these parameters to access data that should be restricted based on their role. This represents a broken access control issue, classified under CWE-284. The vulnerability does not require user interaction and can be exploited remotely over the network without authentication beyond basic user privileges. The CVSS 3.1 score is 6.5, reflecting high confidentiality impact but no impact on integrity or availability. The scope is unchanged, meaning the vulnerability affects only the component where it exists. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow unauthorized disclosure of sensitive information managed within Archibus Web Central, which is a widely used integrated workplace management system (IWMS) for real estate, infrastructure, and facilities management.
Potential Impact
For European organizations using Archibus Web Central, this vulnerability poses a significant risk to the confidentiality of sensitive facility and real estate management data. Unauthorized access to such data could lead to exposure of critical infrastructure details, occupancy information, financial data, or strategic planning documents. This could facilitate further targeted attacks, insider threats, or competitive intelligence gathering. Given that Archibus is used by many large enterprises, universities, and government agencies across Europe, the impact could be substantial if exploited. The lack of integrity or availability impact means the threat is primarily data leakage rather than system disruption. However, the exposure of sensitive data could have regulatory consequences under GDPR, especially if personal data or critical infrastructure information is involved. This could lead to reputational damage, legal penalties, and loss of trust.
Mitigation Recommendations
Organizations should immediately review access control configurations within Archibus Web Central and restrict user permissions to the minimum necessary. Implement strict validation and sanitization of user-supplied parameters in the affected service to ensure users can only query data within their authorized scope. Monitor logs for unusual access patterns indicative of parameter tampering. Until an official patch is released, consider isolating the Archibus Web Central instance behind additional access controls such as VPNs or IP whitelisting to limit exposure. Conduct a thorough audit of data accessible to basic users and remove any unnecessary sensitive information. Engage with the vendor or community to obtain patches or workarounds as soon as they become available. Additionally, implement network segmentation and data loss prevention (DLP) controls to reduce the risk of data exfiltration if unauthorized access occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Switzerland
CVE-2022-45166: n/a in n/a
Description
An issue was discovered in Archibus Web Central 2022.03.01.107. A service exposed by the application accepts a set of user-controlled parameters that are used to act on the data returned to the user. It allows a basic user to access data unrelated to their role.
AI-Powered Analysis
Technical Analysis
CVE-2022-45166 is a medium-severity vulnerability affecting Archibus Web Central version 2022.03.01.107. The vulnerability arises from improper access control in a service exposed by the application. Specifically, the service accepts user-controlled parameters that influence the data returned to the user. Due to insufficient authorization checks, a basic user can manipulate these parameters to access data that should be restricted based on their role. This represents a broken access control issue, classified under CWE-284. The vulnerability does not require user interaction and can be exploited remotely over the network without authentication beyond basic user privileges. The CVSS 3.1 score is 6.5, reflecting high confidentiality impact but no impact on integrity or availability. The scope is unchanged, meaning the vulnerability affects only the component where it exists. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow unauthorized disclosure of sensitive information managed within Archibus Web Central, which is a widely used integrated workplace management system (IWMS) for real estate, infrastructure, and facilities management.
Potential Impact
For European organizations using Archibus Web Central, this vulnerability poses a significant risk to the confidentiality of sensitive facility and real estate management data. Unauthorized access to such data could lead to exposure of critical infrastructure details, occupancy information, financial data, or strategic planning documents. This could facilitate further targeted attacks, insider threats, or competitive intelligence gathering. Given that Archibus is used by many large enterprises, universities, and government agencies across Europe, the impact could be substantial if exploited. The lack of integrity or availability impact means the threat is primarily data leakage rather than system disruption. However, the exposure of sensitive data could have regulatory consequences under GDPR, especially if personal data or critical infrastructure information is involved. This could lead to reputational damage, legal penalties, and loss of trust.
Mitigation Recommendations
Organizations should immediately review access control configurations within Archibus Web Central and restrict user permissions to the minimum necessary. Implement strict validation and sanitization of user-supplied parameters in the affected service to ensure users can only query data within their authorized scope. Monitor logs for unusual access patterns indicative of parameter tampering. Until an official patch is released, consider isolating the Archibus Web Central instance behind additional access controls such as VPNs or IP whitelisting to limit exposure. Conduct a thorough audit of data accessible to basic users and remove any unnecessary sensitive information. Engage with the vendor or community to obtain patches or workarounds as soon as they become available. Additionally, implement network segmentation and data loss prevention (DLP) controls to reduce the risk of data exfiltration if unauthorized access occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839d93e182aa0cae2b73015
Added to database: 5/30/2025, 4:13:50 PM
Last enriched: 7/8/2025, 3:56:31 PM
Last updated: 12/4/2025, 4:54:43 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumHow I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
MediumNation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.