{"api_version":"1","generated_at":"2026-04-22T16:04:41+00:00","cve":"CVE-2022-0564","urls":{"html":"https://cve.report/CVE-2022-0564","api":"https://cve.report/api/cve/CVE-2022-0564.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0564","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0564"},"summary":{"title":"CVE-2022-0564","description":"A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured.","state":"PUBLIC","assigner":"csirt@divd.nl","published_at":"2022-02-21 18:15:00","updated_at":"2024-01-02 19:15:00"},"problem_types":["CWE-203"],"metrics":[],"references":[{"url":"https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531","name":"https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531","refsource":"CONFIRM","tags":[],"title":"Qlik Sense Enterprise on Windows - November 2021 I... - Qlik Community - 1856531","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://csirt.divd.nl/DIVD-2021-00021/","name":"https://csirt.divd.nl/DIVD-2021-00021/","refsource":"MISC","tags":[],"title":"Redirecting…","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://csirt.divd.nl/CVE-2022-0564/","name":"https://csirt.divd.nl/CVE-2022-0564/","refsource":"MISC","tags":[],"title":"Redirecting…","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://csirt.divd.nl/cves/CVE-2022-0564","name":"https://csirt.divd.nl/cves/CVE-2022-0564","refsource":"CONFIRM","tags":[],"title":"Qlik sense Enterprise Domain User enumeration | DIVD CSIRT","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://csirt.divd.nl/cases/DIVD-2021-00021","name":"https://csirt.divd.nl/cases/DIVD-2021-00021","refsource":"CONFIRM","tags":[],"title":"DIVD-2021-00021 - Qlik Sense Enterprise domain user enumeration | DIVD CSIRT","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0564","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0564","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"564","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qlik","cpe5":"qlik_sense","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-0564","ASSIGNER":"csirt@divd.nl","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-204: Observable Response Discrepancy","cweId":"CWE-204"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Qlik Sense","product":{"product_data":[{"product_name":"Qlik Sense Enterprise on Windows","version":{"version_data":[{"version_value":"14.x","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531","refsource":"MISC","name":"https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531"},{"url":"https://csirt.divd.nl/DIVD-2021-00021/","refsource":"MISC","name":"https://csirt.divd.nl/DIVD-2021-00021/"},{"url":"https://csirt.divd.nl/CVE-2022-0564/","refsource":"MISC","name":"https://csirt.divd.nl/CVE-2022-0564/"}]},"generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"DIVD-2021-00021","discovery":"INTERNAL"},"work_around":[{"lang":"en","value":"Disable internet-facing NTLM endpoints, e.g. internal_windows_authentication, to avoid domain enumeration.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Disable internet-facing NTLM endpoints, e.g. internal_windows_authentication, to avoid domain enumeration.</p>"}]}],"solution":[{"lang":"en","value":"Update Qlik Sense Enterprise on Windows to version 14.44.0 or higher.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Update Qlik Sense Enterprise on Windows to version 14.44.0 or higher.</p>"}]}],"credits":[{"lang":"en","value":"This issue was discovered by Hidde Smit of DIVD. "}],"impact":{"cvss":[{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}},"nvd":{"publishedDate":"2022-02-21 18:15:00","lastModifiedDate":"2024-01-02 19:15:00","problem_types":["CWE-203"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qlik:qlik_sense:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.44.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"564","Ordinal":"228338","Title":"CVE-2022-0564","CVE":"CVE-2022-0564","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"564","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}