TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-7602-a47a2-1.html |
![]() ![]() |
History
Mon, 14 Oct 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 |
Mon, 14 Oct 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution. | TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution. |
Weaknesses | CWE-940 |
Thu, 03 Oct 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | NVD-CWE-noinfo |

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-10-14T06:07:26.822Z
Reserved: 2023-11-16T03:52:23.443Z
Link: CVE-2023-48387

No data.

Status : Modified
Published: 2023-12-15T09:15:08.357
Modified: 2024-11-21T08:31:36.933
Link: CVE-2023-48387

No data.