Lucene search

K
vulnrichmentESETVULNRICHMENT:CVE-2024-7263
HistoryAug 15, 2024 - 2:29 p.m.

CVE-2024-7263 Arbitrary Code Execution in WPS Office

2024-08-1514:29:04
CWE-22
ESET
github.com
36
cve-2024-7263
wps office
improper validation
arbitrary execution
windows library

CVSS4

9.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H/AU:N

EPSS

0.011

Percentile

85.1%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.17115 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.
The patch released in version 12.1.0.17119 to mitigate CVE-2024-7262 was not restrictive enough. Another parameter was not properly sanitized which leads to the execution of an arbitrary Windows library.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:kingsoft:wps_office:12.2.0.13110:*:*:*:*:*:*:*"
    ],
    "vendor": "kingsoft",
    "product": "wps_office",
    "versions": [
      {
        "status": "affected",
        "version": "12.2.0.13110",
        "versionType": "custom",
        "lessThanOrEqual": "12.2.0.17153"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

9.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H/AU:N

EPSS

0.011

Percentile

85.1%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total