<a href="https://github.com/ComparedA...">
An "Incorrect Use of a Privileged API" vulnerability in PrintixService.exe, in Printix's "Printix Secure Cloud Print Management", Version 1.3.1106.0 and below allows a Local Or Remote attacker the ability change all HKEY Windows Registry values as SYSTEM context via the UITasks.PersistentRegistryData parameter. This CVE allows anyone to connect to your corporate network and change any registry value that they please on the remote computer. Any user logged in (regardless of their user role) is able to target themselves, or have someone remotely systematically change all registry values on the machine. A patch could be released within a couple months, yet this may take even longer due to how embedded this command is inside their API, and how their entire authentication framework has to be changed
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | CVE-2022-25089 | 2 Mar 202223:19 | – | cvelist |
![]() | CVE-2022-25089 | 3 Mar 202200:15 | – | nvd |
![]() | Printix Client 1.3.1106.0 Remote Code Execution | 2 Mar 202200:00 | – | packetstorm |
![]() | CVE-2022-25089 | 3 Mar 202200:15 | – | cve |
![]() | Printix Client 1.3.1106.0 - Remote Code Execution (RCE) | 2 Mar 202200:00 | – | exploitdb |
![]() | Code injection | 3 Mar 202200:15 | – | prion |
![]() | CVE-2022-25089 | 22 May 202521:49 | – | redhatcve |
![]() | Printix Client 1.3.1106.0 - Remote Code Execution Exploit | 2 Mar 202200:00 | – | zdt |
![]() | Exploit for Improper Privilege Management in Kofax Printix | 10 Feb 202219:12 | – | githubexploit |
![]() | Exploit for CVE-2022-29552 | 10 May 202214:35 | – | githubexploit |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo