In KioWare for Windows (versions all through 8.34) it is possible to exit this software and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.
In order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kioware
Kioware kioware |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:* | |
Vendors & Products |
Kioware
Kioware kioware |

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2024-08-01T20:12:06.924Z
Reserved: 2024-04-08T10:30:35.750Z
Link: CVE-2024-3460

Updated: 2024-08-01T20:12:06.924Z

Status : Analyzed
Published: 2024-05-14T15:41:12.850
Modified: 2025-02-12T15:36:15.813
Link: CVE-2024-3460

No data.