A vulnerability was found in Backdoor.Win32.Psychward.10. It has been rated as critical. Affected by this issue is some unknown functionality of the component Service Port 13013. The manipulation leads to backdoor. Using CWE to declare the problem leads to CWE-912. The weakness was disclosed 10/23/2022 as MVID-2022-0651. The advisory is shared for download at malvuln.com. The attack may be launched remotely. There are no technical details available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1588.001. It is declared as proof-of-concept. The exploit is available at malvuln.com. As 0-day the estimated underground price was around $0-$5k. It is recommended to apply restrictive firewalling. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
Field | 10/23/2022 08:19 |
---|---|
cvss2 | 6.1 |
cvss3 | 7.3 |
cvss3 | 6.4 |
cvss3 | 7.3 |
cvss3 | 6.4 |
price | $0-$5k |
name | Backdoor.Win32.Psychward.10 |
component | Service Port 13013 |
cwe | 912 (backdoor) |
risk | 2 |
cvss3 | N |
cvss3 | L |
cvss3 | N |
cvss3 | N |
cvss3 | U |
cvss3 | L |
cvss3 | L |
cvss3 | L |
cvss3 | P |
cvss3 | W |
cvss3 | R |
identifier | MVID-2022-0651 |
url | https://malvuln.com/advisory/70c5f8d61f6ac67091c0c5860e456427.txt |
availability | 1 |
publicity | 1 |
url | https://malvuln.com/advisory/70c5f8d61f6ac67091c0c5860e456427.txt |
name | Firewall |
responsible | VulDB |
nocve | 1 |
date | 1666476000 (10/23/2022) |
type | Remote Access Software |
cvss2 | N |
cvss2 | L |
cvss2 | N |
cvss2 | P |
cvss2 | P |
cvss2 | P |
cvss2 | POC |
cvss2 | UR |
cvss2 | W |
cvss2 | 7.5 |