ks-soft Advanced Host Monitor up to 12.56 rma_active.exe unquoted search path
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.1 | $0-$5k | 0.00 |
A vulnerability was found in ks-soft Advanced Host Monitor up to 12.56 and classified as problematic. Affected by this issue is an unknown code of the file C:\Program Files (x86)\HostMonitor\RMA-Win\rma_active.exe. The manipulation with an unknown input leads to a unquoted search path vulnerability. Using CWE to declare the problem leads to CWE-428. The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. Impacted is confidentiality, integrity, and availability.
The weakness was shared 04/28/2023. This vulnerability is handled as CVE-2023-2417. Technical details are known, but there is no available exploit. This vulnerability is assigned to T1574.009 by the MITRE ATT&CK project.
Upgrading to version 12.60 eliminates this vulnerability.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Vendor
Name
Version
- 12.0
- 12.1
- 12.2
- 12.3
- 12.4
- 12.5
- 12.6
- 12.7
- 12.8
- 12.9
- 12.10
- 12.11
- 12.12
- 12.13
- 12.14
- 12.15
- 12.16
- 12.17
- 12.18
- 12.19
- 12.20
- 12.21
- 12.22
- 12.23
- 12.24
- 12.25
- 12.26
- 12.27
- 12.28
- 12.29
- 12.30
- 12.31
- 12.32
- 12.33
- 12.34
- 12.35
- 12.36
- 12.37
- 12.38
- 12.39
- 12.40
- 12.41
- 12.42
- 12.43
- 12.44
- 12.45
- 12.46
- 12.47
- 12.48
- 12.49
- 12.50
- 12.51
- 12.52
- 12.53
- 12.54
- 12.55
- 12.56
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.1
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Unquoted search pathCWE: CWE-428 / CWE-426
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Advanced Host Monitor 12.60
Timeline
04/28/2023 🔍04/28/2023 🔍
04/28/2023 🔍
05/24/2023 🔍
Sources
Advisory: 172105Status: Confirmed
CVE: CVE-2023-2417 (🔍)
GCVE (CVE): GCVE-0-2023-2417
GCVE (VulDB): GCVE-100-227714
Entry
Created: 04/28/2023 06:54 PMUpdated: 05/24/2023 08:30 AM
Changes: 04/28/2023 06:54 PM (38), 05/24/2023 08:30 AM (4)
Complete: 🔍
Submitter: mrempy
Cache ID: 18:E97:40
Submit
Accepted
- Submit #147794: Advanced Host Monitor <= 13.92 Beta - Unquoted Service Path (by mrempy)
No comments yet. Languages: en.
Please log in to comment.