Vulnerability Details : CVE-2022-23764
The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution.
Vulnerability category: Execute code
Products affected by CVE-2022-23764
- cpe:2.3:a:teruten:webcube:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23764
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 26 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23764
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
KrCERT/CC |
CWE ids for CVE-2022-23764
-
The product does not properly verify that the source of data or communication is valid.Assigned by:
- nvd@nist.gov (Primary)
- vuln@krcert.or.kr (Secondary)
References for CVE-2022-23764
-
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66876
Third Party Advisory
Jump to