This issue has been fixed in version 2026.4
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Comarch
Comarch erp Optima |
|
| Vendors & Products |
Comarch
Comarch erp Optima |
Thu, 14 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Comarch ERP Optima client connects to a database using a high privileged account regardless of an application account to which a user logs in. It is possible for a local attacker who controls the client process to dump it's memory, extract credentials and use them to gain a privileged access to the database. In order to exploit this vulnerability, the client application has to be already configured, but a user does not have to be logged in. This issue has been fixed in version 2026.4 | |
| Title | Privilege Escalation in Comarch ERP Optima | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-05-14T15:29:13.663Z
Reserved: 2025-12-17T14:10:16.437Z
Link: CVE-2025-68420
Updated: 2026-05-14T15:28:24.441Z
Status : Deferred
Published: 2026-05-14T11:16:16.177
Modified: 2026-05-14T16:07:11.137
Link: CVE-2025-68420
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:32:44Z