Topaz OFD 2.11.0.201 Protection Module Warsaw core.exe unquoted search path
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.0 | $0-$5k | 3.17 |
Summary
A vulnerability was found in Topaz OFD 2.11.0.201. It has been classified as problematic. This impacts an unknown function of the file C:\Program Files\Topaz OFD\Warsaw\core.exe of the component Protection Module Warsaw. Performing a manipulation results in unquoted search path. This vulnerability was named CVE-2023-5012. The attack needs to be approached locally. In addition, an exploit is available. Upgrading the affected component is recommended.
Details
A vulnerability, which was classified as problematic, was found in Topaz OFD 2.11.0.201. This affects an unknown code block of the file C:\Program Files\Topaz OFD\Warsaw\core.exe of the component Protection Module Warsaw. The manipulation with an unknown input leads to a unquoted search path vulnerability. CWE is classifying the issue as CWE-428. The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was presented 09/16/2023. This vulnerability is uniquely identified as CVE-2023-5012. Technical details and a exploit are known. MITRE ATT&CK project uses the attack technique T1574.009 for this issue.
It is declared as proof-of-concept.
Upgrading to version 2.12.0.259 eliminates this vulnerability. A possible mitigation has been published 3 weeks after the disclosure of the vulnerability. The product was updated to properly quote the full search path of the executable, including quotation marks, before executing the user's core.exe. The vendor explains that each of their product's client institutions provides updates through their own process, and they provide the corrected version to client institutions on the same date that they make the correction available. The end user should contact the institution that provides our product for more details on the update schedule for the corrected version.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.1VulDB Meta Temp Score: 6.0
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔍
CNA Base Score: 5.3
CNA Vector (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Unquoted search pathCWE: CWE-428 / CWE-426
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: OFD 2.12.0.259
Timeline
09/16/2023 🔍09/16/2023 🔍
09/16/2023 🔍
10/03/2023 🔍
01/15/2024 🔍
Sources
Status: ConfirmedCVE: CVE-2023-5012 (🔍)
GCVE (CVE): GCVE-0-2023-5012
GCVE (VulDB): GCVE-100-239853
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 09/16/2023 08:36Updated: 01/15/2024 21:31
Changes: 09/16/2023 08:36 (39), 10/12/2023 13:14 (2), 10/12/2023 13:20 (28), 01/15/2024 21:31 (10)
Complete: 🔍
Submitter: _Phx
Cache ID: 216::103
Submit
Accepted
- Submit #204269: Topaz OFD - Warsaw Technology v2.11.0.201 - Unquoted Path (by _Phx)
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.