Description
TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.
Published: 2023-12-15
Score: 8.8 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Update version to 4.2.3.33

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-52439 TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.
History

Mon, 14 Oct 2024 06:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Mon, 14 Oct 2024 06:15:00 +0000

Type Values Removed Values Added
Description TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution. TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.
Weaknesses CWE-940

Thu, 03 Oct 2024 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79 NVD-CWE-noinfo

Subscriptions

Twca Jcicsecuritytool
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-10-14T06:07:26.822Z

Reserved: 2023-11-16T03:52:23.443Z

Link: CVE-2023-48387

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-15T09:15:08.357

Modified: 2024-11-21T08:31:36.933

Link: CVE-2023-48387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses