Trojan-Dropper.Win32.Corty.10 cleartext storage in the registry

A vulnerability was found in Trojan-Dropper.Win32.Corty.10 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cleartext storage in the registry. The CWE definition for the vulnerability is CWE-314. The weakness was shared 09/20/2022 as MVID-2022-0639. The advisory is shared at malvuln.com. The attack may be initiated remotely. There are no technical details available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The price for an exploit might be around USD $0-$5k at the moment. MITRE ATT&CK project uses the attack technique T1555 for this issue. It is declared as proof-of-concept. The exploit is available at malvuln.com. We expect the 0-day to have been worth approximately $0-$5k. A possible mitigation has been published before and not just after the disclosure of the vulnerability.

Field09/20/2022 10:01
nameTrojan-Dropper.Win32.Corty.10
cwe314 (cleartext storage in the registry)
risk2
cvss3_vuldb_avN
cvss3_vuldb_acL
cvss3_vuldb_prL
cvss3_vuldb_uiN
cvss3_vuldb_sU
cvss3_vuldb_cL
cvss3_vuldb_iN
cvss3_vuldb_aN
cvss3_vuldb_eP
cvss3_vuldb_rcR
identifierMVID-2022-0639
urlhttps://malvuln.com/advisory/f72138e574743640bdcdb9f102dff0a5.txt
availability1
publicity1
urlhttps://malvuln.com/advisory/f72138e574743640bdcdb9f102dff0a5.txt
responsibleVulDB
nocve1
date1663624800 (09/20/2022)
cvss2_vuldb_avN
cvss2_vuldb_acL
cvss2_vuldb_ciP
cvss2_vuldb_iiN
cvss2_vuldb_aiN
cvss2_vuldb_ePOC
cvss2_vuldb_rcUR
cvss2_vuldb_auS
cvss2_vuldb_rlND
cvss3_vuldb_rlX
cvss2_vuldb_basescore4.0
cvss2_vuldb_tempscore3.4
cvss3_vuldb_basescore4.3
cvss3_vuldb_tempscore3.9
cvss3_meta_basescore4.3
cvss3_meta_tempscore3.9
price_0day$0-$5k

Want to stay up to date on a daily basis?

Enable the mail alert feature now!