Lucene search

K
cvelistTwcertCVELIST:CVE-2023-48387
HistoryDec 15, 2023 - 8:40 a.m.

CVE-2023-48387 TAIWAN-CA(TWCA) JCICSecurityTool - Improper Input Validation

2023-12-1508:40:34
CWE-20
twcert
www.cve.org
taiwan-ca twca jcicsecuritytool improper input validation remote code execution

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.5%

TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "JCICSecurityTool",
    "vendor": "TAIWAN-CA(TWCA)",
    "versions": [
      {
        "status": "affected",
        "version": "4.2.3.32"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.5%

Related for CVELIST:CVE-2023-48387